x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:48:36 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 2: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) 16:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, 0x0, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, 0x0, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, 0x0, 0x40) 16:48:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x130, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 2: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x130, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) r1 = getuid() r2 = getpid() r3 = getuid() r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) r5 = getuid() r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r7 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) r9 = accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) r10 = open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r13, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r14 = getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00)=0x0, &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) r17 = pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r19 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r19, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r20 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r20, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r21 = openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r22 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r22, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) sendmmsg$unix(r0, &(0x7f0000002e00)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="07d1e7970ac847c29f39e562fbb8985084668a0bab3691b6fa65d2eea7cd2779cd56030509115134fbf2b83289dfa375629c9f1f0a93f2b6dd7056fa97ed53417cf1e5998508ef850b1320", 0x4b}], 0x1, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x140, 0x24040840}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="27bd1cc0cf2b335aac753307faacf9835e3f2f0ca72eb89c78e6027b664071b5bf6acb37ba4e019eeb5f273d68fbb1e48155664710575a21a054f7ca915bb243dbe57ba351e43bc48cef164a6ad9f545670ab9ba49de0df7ff4a277b4e8217c66052eafd0ead9680ffe9fbd23b849e9ce092e0eeb31841cc50b7bfd794ff22c5cd17d792ce76202164a7f8c6869e6fdeac633d89a75d1034f29dfc33e43eb7f3dad69c3e7ea511bad540f9d711e9db33d46f9367e5aed24a49ded0ad63365d3931616e3902b07dcfd1f84997dac8e61032e2ee7140808762f309b5c734309f97dd54", 0xe2}], 0x1, &(0x7f0000000740)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}], 0x138, 0x4000}}, {{&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000900)="5fd5fc266e3f5bc2736945121314abc75e0f52fb659ba66d48292b03a17e45d60a3163225a852f478058b202564398505a1399d55f9880cd55badbe88ab534502291f19574ecc9dbd4330049b49db87caa6c8ac718cd9246ce36f7e487fa60944c6778720649a68e9f623f1db79078da3c0b8c43b64052ae84c12f286890cea07e1ff297fff8", 0x86}, {&(0x7f00000009c0)="10e5e1d0bde8588779ad627992d48c4cf9", 0x11}, {&(0x7f0000000a00)="cecfcfa627f35471a5b00fb879d18e81a4d0eafdc22a0bcf2b92071bb128844675e6b37ade7743b3f1bbacdc9b340eacfb2001f594852190691f16b442ae7a193c376ac38f4bc02a824c82e15418368121f0067be4099e19f5d1f37da5d6b3ee45af45ab8db09eb40b3e6f0ea75f2fe3418fd37968cdb241f71466675345485a975bd778e569995295170edca10050f79fd6186bd3b43ef0c8714d9295b2cd590778da9fdbc295bcfa1d308ae6e9ec082d4136e63dbd7940a7519f3f3f88b21736c985084a5f391f2d79347d4feb583fe6f0670ece1c0ff61cce1b75", 0xdc}, {&(0x7f0000000b00)="4064386d22fc181c48e0f5097c6083c4213434ff4a6a93098567ca061e60bd43d22b4352ef57fde8ebca9826504029028d8514271754444d01f77ceb4c28637f0dc4c8a8f80bdf6e9ce4c688f45a5bdfa65f789b658d4699f04ef42c99604605750738ffda7f9bb2d10890bce78fee75242471a98b6cf2373bcb758c5dd78e72eaedf3bd978708a04c995fddb3e51811c0e8b837d124bf6b2797e9f6e34e8013c2b71dae81eb49bb76afd4a3044ac40f2794f168dafa18ad5358f7f7f0e12b0e3e279996733ec07e6a5645242bbfffe57cf8bf29b2c85a666949c355326806a2beabb3a10be3632cb89c6ac5098551", 0xef}, {&(0x7f0000000c00)="fd28955b46c5d5c59bc15da8538cd784bdfb9871f0779526634e74272db732d8b49380bcd177b5c9ae4bc357480e79558456903b0008f64e439f3a1fa971e08aa8eebf791e15b57e10665d4725b1fded19608f8fc74a96a7851c4d8c451b0f869e04b3844f96aeee924b492483c3707400f7bb58244691fd0f063c7e4117c35e5fc07887e21445a594ddb59636cb43f4f417d07ec064ddecdb2d052e660f17bbd8f17fc193d7ccdea17a8edc695f86a69c32164868725ce243c592185c2d0fe2b812", 0xc2}], 0x5, &(0x7f0000000e00)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x44081}}, {{&(0x7f0000000e40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="f570c9368a254cef44292d439096b26ab8ab9b335f6268e07525b39c84bdfa72e317554cf6de1d4eddafba58ac2b84bff6fd59e4a27356d0574b5b66efe13094085a1a74f3ff84769307444fa06cdef7d5d909e14f3ae3e9d3326617e992be72146c862f5aea07154da7da124199da72167a57f8e72a71ea2030b57baab53d59133f06252dbaa11b8156b9e1baaa543fd9829a2c6adce9cb2b30cd723b9c679fdabe8e446a3f568248f3a028d1369ebce98ac884d71c62910625bf382233517c1b6671e39c9d3adfec2646d6dc90b91c1be1a503173f74d856536f2f540126867eb8394901633b57bf975e", 0xeb}], 0x1, &(0x7f0000001040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f00000010c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000001140)="5a04174c361a2f7d2371e8c084689831e4a14d1ad01d47", 0x17}, {&(0x7f0000001180)="e8c1900c1702a0eabd4e1f5c8ec62ab7732e35d4be8a6b211e78ce66a1292629b244babb3159969d4ba028378db8412aeb7dedc9f17746367ceb00c022e29118216be4600dd42251e8ef7170d401faadc5b47951029880e35849", 0x5a}, {&(0x7f0000001200)="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", 0xfb}, {&(0x7f0000001300)="b5005f0a4cface46d3efb17b5c4a1e11d6b0e16f34da41c71024c38d2ca0a606640d683f7a0d4ecac925ecf0f1200776a19d3cde1f77dfcb63482eb3f923f27f2d1b66bb552f44d549a1f321349c301c65c21b6c79483ea17a9b66f8f1d2695eb8d516ee47dd85bf8d638961f30f6e025c9e5ca2099ece0a489dc45ec3003d497eaf077ba53feea6bf526cad585cc219904c55f472e089f3d0a23844054f05dfa39024434e3882166f0203fce5b2cdd7736c5cc0ce086c0a0ed0518a316e6da21d6a0e09bf04e67f377fe29afad1612ff3b4f965f155e04e0595418f8890cc3d0de2b6be076b0d83b641962746952f0deaa82677a097c2d18d1fdcb968c59a5d67dfc0b1855a981e1991e80095153c62337c2b177d7a30a3045d5ad399d51884b3ffd70b217895fdf869ba61d9cdc8dd931d4e932af8fb18bc416b226ddd21c899832f55ff8a5b40d8376b7f9be99463542f15138009a995d7e222d6797e0849188bf1917458f26cf08d5d7c255309fd20e4ef9804265424ad229cfa256335ed09b5f02901b4523abdf03830fe890e03058c903246ce437ee5dc3fc34cf7539008f54b2e5c85e0c15a97572c2c2a277943dbafb4847d5114da539d0c73c7436da25bd3e609988470829fe192b05c0eccfc42b49e67a3a2bf62ee61cb97b8e507e672d9a2e3591ca2c1847abf0f38de22c9f36e59c4b980f12238e9874e5e7a829cf0fc823b31d3c7006b5995a895dd8a66568d040f7e8c1df3cbbf6bb610ccb988bdb04ef2692b7c7b9ff20f6b8d0d3a4fcc6aaaa2b2d0c03a1c98045bcc87f3e099d625d194eee910d45b17edadfd7104f021c75d128ceb88ee0f329ba18e4a64b43a620d4f507d85885d7e20988fdffafafb266cb61f0290b41a891ccb596d0a89246aa552f11e4999128e1b2ddad68b46930fa1e17fb583eca43253f1083c1e6b47e5628aa38d20d8fe73607c14b8532362c4769a275b5cc19049fe9588df4e59caf6910a3cdf7763b4911ce1c9a00bfefddd84d8a2cd0e46fea493eda68c7c03be5add56496212ce9cb92859d275533c674c826d4ced44f9c87f0f151881b3ee36bc9246cff0f42534ce391b36edeff9b0cb8ba73be29752f58b041638faf4745f4c09f6fec49dd666ba3d173fbf6d8222a2a4d2b73011bc2f7a9f37cb1a1c068a7216af368701d044df9a8ada729c061176bc94657b09ed8dc4dc870b6551c5a1a621f531a67d71eea548d803c1c690cbb8dc3df254dadf5cf654391c43ded1051c9f02b4186c4b15f356e5a9ec8b591c4e62a06aad60b5bc806b3df5745aba9b939afd2258edee6b401be8545c6c347ec8ef0c207b6f42ae77f169c62d4445b5d71d690718e8b93db59c0793a9c43df2ce1ce62eea01145edaf551cfd255fb28ff91d71260be4677fc2da1f1ab180c36052921d42e3f5192e8b17beada6b9e6ac3d2622ea7859c26f4aa368e5c5d62a2bb39e45ba9439132a8967d88d848c2e0b9631017be8178e4a6e812e2343da912c7efabb560b2fea2fd72221e2631462506fbc07579b48b7c3fb37d5a950e8b604f2b96a158bfeb57923e140d776298894da8905b66e763823659ba1271bbdec9b125ae1325723cdda4b614918c7e77dfbd2207ba6df4ccefc88462736c0f497ca7ce6fc2ee34055070c0ded88a86617eeee3508a7b82bccca92d68affa657b81f8a527e8ab46fd2107e1a933b811a6968c173f89a504ccc1cf0f8148c0273f6b228d3c6c97cc03425a81f5759e32e8a797200d05778414a27907d0275a19e80bcae1118d964c6379caed36de101660f29990cdaef5073dc5f264c5343dfecd63e15efabd8a6815e5258a3316dcb6275934c576c3d30df8234e8a5f1d94d746a0659106dd2605801d77938e9f5e38fc04f01d380ec82f4fb8ca57449872629993a77347adb9737d0b8b54ccff0d834447f295fb86957df4ba91ad7402fd71126414f4e472f2b8ddee874c92b407e51a2bd3a72372b0fbd8f71abcf6d4ff0ea1198390da38cb2a24478eff507d90729abc925704f6c4bf78e4eafb9b50759198d83b8248cc93680f80a93139cd00bf0722a3eed7cd661c34a36adfe46bf948dc5f73ca0a94638560c315082cc427922c5c0a244255d8e3e1f6993f2be200f74f370a388abb652d40940db6fd458114b47ba5c704697a85b8a395b341934a449528e2a5b0481e37b6b5b75b2bf27983b3a5804a6512a644a5cb812d1edcdb1aa8f5751bf360c5e76bd2199f5932728f0046313da4679c6d7c7c4b19843ab86a6e012d12f2674d19c1376946411f0410cd5c650aa2ee32559971b6c2e2285c70260081d7f1a4ca27af9d500e364d4bc051ccc7240ca2f46b9d83d7992ec6f2b1f8e21a7f5d8325af9ed5693ddb1d064633a715440553ed57a663fa0c59e58b1bd2e9e729f85db6af170b22ff0912b20e1ae580cbdeafb4f6eb46da6344aa89df89b8475101fd40a2f9d9597e7170ea71279a817b84778930752848777c98d4710fd42b7ae7318ade3352b77818b56962763d1a5bc2053d21faeac27665f8aafd96ac21cdb0afaf78a6bf853ee6faa4f1db2240212e564cebf985c438a4ec1ab8eed632bdb7fddea987ff4c76a2bd0ec3c13f1583206be5da89e5dae9c7b34b5b9bca2742ca3ab4ffe6476a81f79451185d0891fbc1e86e8bdfb39c2f7b7f1dd174aebb5fc82d57483abffce9d8bede83c95bc5f89ac4b2c24afe27af2bca249160b75ece0232a77588151766398dfeeeb5e9ff538d25b27467682caed54e7f9fd9db1a5cf1bfc66a6332b7c60c6768cf63c57fe2af8edaab69a8b997010683c5722fda643ed06891e572936c184c90a30a5c5f6bc4b1f9189914965052717f8b8bab2b5bb350a2ad77042898f40c0a6e2da12c3070abf103c31e4e52c88d46013ab1bf6328566e4da2a31cfb4466b8b11f399bf99b16cbe41b119f69aae04281504eed4bb692dcadae0f8df0fdcb7f4715f9fa751390e0c0a0203f7759a3b55dfbcc78a03f8698266f979bd82e49c800d741922bac45c06ca37bfaac1542d9e6413fad4244df202540960fc722f402d176f4f920716e71fc13bcec1bc5b3d886783f76b9585fac1d95639d80e19e5a25d891f403359f9f23f2d32e9ba0f1f76defe3fbf2badb3f74abd1af6ecdd95f4dfc3fe5bc4b241560dc19f599ef68d88fcfe59c70877ab58a48b9b6efe44cc6d5913954e707333c0515bc0bc2320afd898624dcbcefe96097ed0351726d59b7b332a0ef31aea0a848107210827d8028dd5714cb258d275b080ee61d57657b9b61e7ba7d9d13dc4d59947c0761a6cd454269678a9cf6dbb9c5bd758f11da94526a1bd1c972c23fc251d6f6870a89d13c8e1c4073e2a79d6e14135899572dc2062b9b16273aa67ca89210310e01d0d9465eadf80e42da5cbd662c28bae1a6ba33b4098261dc9990ca19aa05ceb3b33cadf1a7a9b2b01e5018f8fc60338fd8d4779ac68ec396243e3a35026f4d65342df9f5efffd4be3ee99f866a5c552630f10a557581dfbcda29671e2747002aedeaabd3fbb79eaee9a26c501fd802cd58ceeba1ea95dd3735393c00896f69e2ba09de278cef085719afa8c41a2c23444f31f9b372867869e1a25dc80019b127c0edf8908f4dfce0f0750b0c7bc8391deae64f8ba2d6f67bb368d2c5b1c77d1e5ee9400d90c11fbc6e7b6e33cb27e81fad36714f9fc9d24e4df0f353d954c6e2825a20dd15462d7dc364ed3a55fe8f7b16933f692f4870e48d98a0313361ab61e473c340dd5a794f9115ca4a362d2d5368898a669748f2a958a640d977cc9265c1e93b8402f6cd176e753e792838f6cc7e3284c2eaa11fc540ff10b9193bd88c338d3273673e2f021dbd64a9cd9e487caefc2dd036812b8003fe56420265086a6809d84b9523c4239bfa4fa7b4370f221eefbb22c8f5d8101c5b9f800c0cf4c881315564e1604e3597e156d16426f04b80142eb6b880f23df6b9d29a9849c8c336479ee8976d78334520160999af887e011f3af4d0750a480506d6e72670612885c2751f703f477df569f21b7f68b7626b25bfd247e4a926efaa8083f0d7e91b2aabc0f7747b85c138ae87e0562bc6333b390e537e0477dc1e6badfeac66810dfb3f71977efa6efe0be9a0ae1750b811dd7fd4abfa5bf88c2cdf6e5ec63d8ed321aecbf4cd22e4e884126cfe4f07dd6dfa13535756cc68905631c61470af427f9ebbc0a0035e84c662af132311b292054e39b8cd898e79d57ec55074dadca01855f55adac945c406dcc165826abd46af249cbee1cef6ff5db36614f9ac83eac25fcbe062cc7aa6f66135539be03f9ccc9df9cc1cf3a4f77373d1175941b18c25787a0a1db58d3f312795403df7ed6ff8b5409c146a7629535dac3f3d5199d97569adf236ab6e23f4ea7256f6c0293ebaf7716460b54e767cb731697b8be84a716b494c4bc24f3bc3d6986f9baf131b384c235f327dece46763967687fa0852862034ca9da07be56851297829c6e5836bf44bcb146e75752266deae5275956f16fa1e8d656d1a1767089a123985af5d3b0a92fe6abda07132d87865455215ea5fc81af1699e834a2bf5436c1c13ff2b5913dd25f0e97342125e03e04685bc1477781279962803de0bea480f86a2082f08a2df5bf122bbee1dad1d9bdd4efc2207986021c1d79c0d6ed2f2df3c32a24f69f5e38ecb04ec40e6f572ee6dd7b9cbcf59cf6c335b22a61430d87ae4f7892d3b21a64b419fe10d432f7dd742a2ff58d8028d8c31372e99c54eac53f37460bcf86525d0bb2b847f3f4f89f36202b4f1bfeb4cd645c003840d5d0d03cda27b34cb8599ff04ccb58d327ca83307e477d6527feb0cf6a0f6202988799f0f37828654a65b289a13aac3eb6e28109e99280e092d696b3c53b6f36a8b59f92eba2df7da3bbaf0d44a16410711881d02116ecb87e7cb8a72e54361a9e16059bb7018492699d66d6f6e165f6897a3421982940c27988475a3eb58714efbffb1f8973dcdf1f74dbd74f120900bea59a7d6c430dc50b66dd4291307a4732f191bebe42c691c1becb7778d3f2c64a099064fec7422ed24b684912988b2a3960996ff1f6abe1a08129cf5c2d4f825da804c55c097a283307b81158663e7ea0494ff42ffe9af7c75c16f5a27378b4d2b62a500765f221bc446879c36d17ae075a225d4a29e808eb9b769c9e9b876f8de7466447f2fa0ac4690b7b5920be6b4c7bde62af5536f8c921c00766cc94a7dd5c7b7f1a910f8f0019991d409369ead5dc51ed0c7d7e2057a91ca208aca32aa9cf5d58416059e62238806b32486d917a08123cc152da717aa46fd085fcaabc54057e854c3c39e6a5a64740eea537eb1920fcc08fe060000736399e319617ad82caa51278d0654c81084b32b8f098798a5fc932c86216ce7e3b5d791c9843a7dec945e6d01cf8b31370d5555fbd86a22a80db61a4e18cd35cb4aa76d056c9a11a676501bbc33e1372c82a9c4f8a1e0e36ee907ee5df0a044638c6da3d075809407a0714e3e22f147dd968246f635a65e3f0b9fd8a3c6c818ff52118c8976b87052630ffd8d6d6eda5d25ebc4ec90cda7d059595ecead6ac25392d15796a04e15319f0089294d2c721a1e4d37a5068f982929bb2c5166085d15d154bc588876ee3750272085b997ce5251d78b240ed790b89fc378004ad024fc228dd268b1b856c0d3880744ec7f2603b73d9dfe7ff3333fdf671fd74a1744c583ff87b9ae3eeddaa3ad65300d0f2d6adf9fec990ccc063126d80c5485e090820159", 0x1000}], 0x4, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r0, r7, r0]}}, @rights={{0x2c, 0x1, 0x1, [r8, r0, r0, r9, r10, r11, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r12, r0, r13, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, 0xee01}}}], 0x120, 0x4000004}}, {{&(0x7f0000002840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f00000028c0)="78185580cbb2092977a71758dac378e5a898db5d74e28c6bff17e9da09f3c8780dcaceb6498fdd83cabd349c1f68b991ca7bced0b6742ec8b5e9300e0bdb26d2075dbeae085a1ec19f335a718f068b19c2d5af1faaf7ea07684fd35a674125d2b0d558e68db8d2e5ba46c33bf7d9ea28ca73fb5934795f42ac73dc028452934d6dbedca0a336a4f66bc7e25fb87d3755b0ab04bc3b43956a9c89ab62a439b8a999861a0de29203469182e4eb50a93171154e69a1f293c35da8eca426eb8f4a06c794623a278eafd4bf61dfa4f293b12eb9", 0xd1}, {&(0x7f00000029c0)="bfbeb0331f19556fd08201e35d7144177d69b04c77fe002c587fa6c8dca028f43fa6ae89ea8f4e3ba666713624dac7beaffc601b99b7bd57400f8c17119c85979ae18151bd5edd4b45bf328b43cf1df808d0a4f8a2f58edf112a25151f70f7f2175309bf3035043d0e58af81b4a11cefe982968509638362fb9d5f0a17767bac2144b23800f2dbda5c08aacd5428c50923952bac45dcea2418268c9e2a5210a1c05aa8831561e913b4785b58dbc5c523eb1e1a436bddbe2e89909e4ed85febcc64b879cc13dc73bd1f10", 0xca}], 0x2, 0x0, 0x0, 0x40840}}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002b00)="2a2062b6f3c7efc71594e61383a849ff", 0x10}, {&(0x7f0000002b40)="8915212867e978915348fd0b5afe", 0xe}], 0x2, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r15}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x2c, 0x1, 0x1, [r16, 0xffffffffffffffff, r17, r18, r19, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r20, r0, 0xffffffffffffffff, r21, 0xffffffffffffffff, r22, r0]}}], 0x98, 0x8c0}}], 0x7, 0x20000000) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x130, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) r1 = getuid() r2 = getpid() r3 = getuid() r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) r5 = getuid() r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r7 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) r9 = accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) r10 = open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r13, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r14 = getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00)=0x0, &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) r17 = pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r19 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r19, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r20 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r20, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r21 = openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r22 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r22, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) sendmmsg$unix(r0, &(0x7f0000002e00)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="07d1e7970ac847c29f39e562fbb8985084668a0bab3691b6fa65d2eea7cd2779cd56030509115134fbf2b83289dfa375629c9f1f0a93f2b6dd7056fa97ed53417cf1e5998508ef850b1320", 0x4b}], 0x1, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x140, 0x24040840}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="27bd1cc0cf2b335aac753307faacf9835e3f2f0ca72eb89c78e6027b664071b5bf6acb37ba4e019eeb5f273d68fbb1e48155664710575a21a054f7ca915bb243dbe57ba351e43bc48cef164a6ad9f545670ab9ba49de0df7ff4a277b4e8217c66052eafd0ead9680ffe9fbd23b849e9ce092e0eeb31841cc50b7bfd794ff22c5cd17d792ce76202164a7f8c6869e6fdeac633d89a75d1034f29dfc33e43eb7f3dad69c3e7ea511bad540f9d711e9db33d46f9367e5aed24a49ded0ad63365d3931616e3902b07dcfd1f84997dac8e61032e2ee7140808762f309b5c734309f97dd54", 0xe2}], 0x1, &(0x7f0000000740)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}], 0x138, 0x4000}}, {{&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000900)="5fd5fc266e3f5bc2736945121314abc75e0f52fb659ba66d48292b03a17e45d60a3163225a852f478058b202564398505a1399d55f9880cd55badbe88ab534502291f19574ecc9dbd4330049b49db87caa6c8ac718cd9246ce36f7e487fa60944c6778720649a68e9f623f1db79078da3c0b8c43b64052ae84c12f286890cea07e1ff297fff8", 0x86}, {&(0x7f00000009c0)="10e5e1d0bde8588779ad627992d48c4cf9", 0x11}, {&(0x7f0000000a00)="cecfcfa627f35471a5b00fb879d18e81a4d0eafdc22a0bcf2b92071bb128844675e6b37ade7743b3f1bbacdc9b340eacfb2001f594852190691f16b442ae7a193c376ac38f4bc02a824c82e15418368121f0067be4099e19f5d1f37da5d6b3ee45af45ab8db09eb40b3e6f0ea75f2fe3418fd37968cdb241f71466675345485a975bd778e569995295170edca10050f79fd6186bd3b43ef0c8714d9295b2cd590778da9fdbc295bcfa1d308ae6e9ec082d4136e63dbd7940a7519f3f3f88b21736c985084a5f391f2d79347d4feb583fe6f0670ece1c0ff61cce1b75", 0xdc}, {&(0x7f0000000b00)="4064386d22fc181c48e0f5097c6083c4213434ff4a6a93098567ca061e60bd43d22b4352ef57fde8ebca9826504029028d8514271754444d01f77ceb4c28637f0dc4c8a8f80bdf6e9ce4c688f45a5bdfa65f789b658d4699f04ef42c99604605750738ffda7f9bb2d10890bce78fee75242471a98b6cf2373bcb758c5dd78e72eaedf3bd978708a04c995fddb3e51811c0e8b837d124bf6b2797e9f6e34e8013c2b71dae81eb49bb76afd4a3044ac40f2794f168dafa18ad5358f7f7f0e12b0e3e279996733ec07e6a5645242bbfffe57cf8bf29b2c85a666949c355326806a2beabb3a10be3632cb89c6ac5098551", 0xef}, {&(0x7f0000000c00)="fd28955b46c5d5c59bc15da8538cd784bdfb9871f0779526634e74272db732d8b49380bcd177b5c9ae4bc357480e79558456903b0008f64e439f3a1fa971e08aa8eebf791e15b57e10665d4725b1fded19608f8fc74a96a7851c4d8c451b0f869e04b3844f96aeee924b492483c3707400f7bb58244691fd0f063c7e4117c35e5fc07887e21445a594ddb59636cb43f4f417d07ec064ddecdb2d052e660f17bbd8f17fc193d7ccdea17a8edc695f86a69c32164868725ce243c592185c2d0fe2b812", 0xc2}], 0x5, &(0x7f0000000e00)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x44081}}, {{&(0x7f0000000e40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="f570c9368a254cef44292d439096b26ab8ab9b335f6268e07525b39c84bdfa72e317554cf6de1d4eddafba58ac2b84bff6fd59e4a27356d0574b5b66efe13094085a1a74f3ff84769307444fa06cdef7d5d909e14f3ae3e9d3326617e992be72146c862f5aea07154da7da124199da72167a57f8e72a71ea2030b57baab53d59133f06252dbaa11b8156b9e1baaa543fd9829a2c6adce9cb2b30cd723b9c679fdabe8e446a3f568248f3a028d1369ebce98ac884d71c62910625bf382233517c1b6671e39c9d3adfec2646d6dc90b91c1be1a503173f74d856536f2f540126867eb8394901633b57bf975e", 0xeb}], 0x1, &(0x7f0000001040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f00000010c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000001140)="5a04174c361a2f7d2371e8c084689831e4a14d1ad01d47", 0x17}, {&(0x7f0000001180)="e8c1900c1702a0eabd4e1f5c8ec62ab7732e35d4be8a6b211e78ce66a1292629b244babb3159969d4ba028378db8412aeb7dedc9f17746367ceb00c022e29118216be4600dd42251e8ef7170d401faadc5b47951029880e35849", 0x5a}, {&(0x7f0000001200)="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", 0xfb}, {&(0x7f0000001300)="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", 0x1000}], 0x4, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r0, r7, r0]}}, @rights={{0x2c, 0x1, 0x1, [r8, r0, r0, r9, r10, r11, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r12, r0, r13, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, 0xee01}}}], 0x120, 0x4000004}}, {{&(0x7f0000002840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f00000028c0)="78185580cbb2092977a71758dac378e5a898db5d74e28c6bff17e9da09f3c8780dcaceb6498fdd83cabd349c1f68b991ca7bced0b6742ec8b5e9300e0bdb26d2075dbeae085a1ec19f335a718f068b19c2d5af1faaf7ea07684fd35a674125d2b0d558e68db8d2e5ba46c33bf7d9ea28ca73fb5934795f42ac73dc028452934d6dbedca0a336a4f66bc7e25fb87d3755b0ab04bc3b43956a9c89ab62a439b8a999861a0de29203469182e4eb50a93171154e69a1f293c35da8eca426eb8f4a06c794623a278eafd4bf61dfa4f293b12eb9", 0xd1}, {&(0x7f00000029c0)="bfbeb0331f19556fd08201e35d7144177d69b04c77fe002c587fa6c8dca028f43fa6ae89ea8f4e3ba666713624dac7beaffc601b99b7bd57400f8c17119c85979ae18151bd5edd4b45bf328b43cf1df808d0a4f8a2f58edf112a25151f70f7f2175309bf3035043d0e58af81b4a11cefe982968509638362fb9d5f0a17767bac2144b23800f2dbda5c08aacd5428c50923952bac45dcea2418268c9e2a5210a1c05aa8831561e913b4785b58dbc5c523eb1e1a436bddbe2e89909e4ed85febcc64b879cc13dc73bd1f10", 0xca}], 0x2, 0x0, 0x0, 0x40840}}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002b00)="2a2062b6f3c7efc71594e61383a849ff", 0x10}, {&(0x7f0000002b40)="8915212867e978915348fd0b5afe", 0xe}], 0x2, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r15}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x2c, 0x1, 0x1, [r16, 0xffffffffffffffff, r17, r18, r19, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r20, r0, 0xffffffffffffffff, r21, 0xffffffffffffffff, r22, r0]}}], 0x98, 0x8c0}}], 0x7, 0x20000000) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={0x0}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x118, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}]}, 0x118}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) r1 = getuid() r2 = getpid() r3 = getuid() r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) r5 = getuid() r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r7 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) r8 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) r9 = accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) r10 = open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r13 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r13, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r14 = getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00)=0x0, &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) r17 = pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r19 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r19, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r20 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r20, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r21 = openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r22 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r22, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) sendmmsg$unix(r0, &(0x7f0000002e00)=[{{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="07d1e7970ac847c29f39e562fbb8985084668a0bab3691b6fa65d2eea7cd2779cd56030509115134fbf2b83289dfa375629c9f1f0a93f2b6dd7056fa97ed53417cf1e5998508ef850b1320", 0x4b}], 0x1, &(0x7f0000000200)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}, @rights={{0x2c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x140, 0x24040840}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)="27bd1cc0cf2b335aac753307faacf9835e3f2f0ca72eb89c78e6027b664071b5bf6acb37ba4e019eeb5f273d68fbb1e48155664710575a21a054f7ca915bb243dbe57ba351e43bc48cef164a6ad9f545670ab9ba49de0df7ff4a277b4e8217c66052eafd0ead9680ffe9fbd23b849e9ce092e0eeb31841cc50b7bfd794ff22c5cd17d792ce76202164a7f8c6869e6fdeac633d89a75d1034f29dfc33e43eb7f3dad69c3e7ea511bad540f9d711e9db33d46f9367e5aed24a49ded0ad63365d3931616e3902b07dcfd1f84997dac8e61032e2ee7140808762f309b5c734309f97dd54", 0xe2}], 0x1, &(0x7f0000000740)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, r0, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}], 0x138, 0x4000}}, {{&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000900)="5fd5fc266e3f5bc2736945121314abc75e0f52fb659ba66d48292b03a17e45d60a3163225a852f478058b202564398505a1399d55f9880cd55badbe88ab534502291f19574ecc9dbd4330049b49db87caa6c8ac718cd9246ce36f7e487fa60944c6778720649a68e9f623f1db79078da3c0b8c43b64052ae84c12f286890cea07e1ff297fff8", 0x86}, {&(0x7f00000009c0)="10e5e1d0bde8588779ad627992d48c4cf9", 0x11}, {&(0x7f0000000a00)="cecfcfa627f35471a5b00fb879d18e81a4d0eafdc22a0bcf2b92071bb128844675e6b37ade7743b3f1bbacdc9b340eacfb2001f594852190691f16b442ae7a193c376ac38f4bc02a824c82e15418368121f0067be4099e19f5d1f37da5d6b3ee45af45ab8db09eb40b3e6f0ea75f2fe3418fd37968cdb241f71466675345485a975bd778e569995295170edca10050f79fd6186bd3b43ef0c8714d9295b2cd590778da9fdbc295bcfa1d308ae6e9ec082d4136e63dbd7940a7519f3f3f88b21736c985084a5f391f2d79347d4feb583fe6f0670ece1c0ff61cce1b75", 0xdc}, {&(0x7f0000000b00)="4064386d22fc181c48e0f5097c6083c4213434ff4a6a93098567ca061e60bd43d22b4352ef57fde8ebca9826504029028d8514271754444d01f77ceb4c28637f0dc4c8a8f80bdf6e9ce4c688f45a5bdfa65f789b658d4699f04ef42c99604605750738ffda7f9bb2d10890bce78fee75242471a98b6cf2373bcb758c5dd78e72eaedf3bd978708a04c995fddb3e51811c0e8b837d124bf6b2797e9f6e34e8013c2b71dae81eb49bb76afd4a3044ac40f2794f168dafa18ad5358f7f7f0e12b0e3e279996733ec07e6a5645242bbfffe57cf8bf29b2c85a666949c355326806a2beabb3a10be3632cb89c6ac5098551", 0xef}, {&(0x7f0000000c00)="fd28955b46c5d5c59bc15da8538cd784bdfb9871f0779526634e74272db732d8b49380bcd177b5c9ae4bc357480e79558456903b0008f64e439f3a1fa971e08aa8eebf791e15b57e10665d4725b1fded19608f8fc74a96a7851c4d8c451b0f869e04b3844f96aeee924b492483c3707400f7bb58244691fd0f063c7e4117c35e5fc07887e21445a594ddb59636cb43f4f417d07ec064ddecdb2d052e660f17bbd8f17fc193d7ccdea17a8edc695f86a69c32164868725ce243c592185c2d0fe2b812", 0xc2}], 0x5, &(0x7f0000000e00)=[@rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28, 0x44081}}, {{&(0x7f0000000e40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000ec0)="f570c9368a254cef44292d439096b26ab8ab9b335f6268e07525b39c84bdfa72e317554cf6de1d4eddafba58ac2b84bff6fd59e4a27356d0574b5b66efe13094085a1a74f3ff84769307444fa06cdef7d5d909e14f3ae3e9d3326617e992be72146c862f5aea07154da7da124199da72167a57f8e72a71ea2030b57baab53d59133f06252dbaa11b8156b9e1baaa543fd9829a2c6adce9cb2b30cd723b9c679fdabe8e446a3f568248f3a028d1369ebce98ac884d71c62910625bf382233517c1b6671e39c9d3adfec2646d6dc90b91c1be1a503173f74d856536f2f540126867eb8394901633b57bf975e", 0xeb}], 0x1, &(0x7f0000001040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee00}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f00000010c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000001140)="5a04174c361a2f7d2371e8c084689831e4a14d1ad01d47", 0x17}, {&(0x7f0000001180)="e8c1900c1702a0eabd4e1f5c8ec62ab7732e35d4be8a6b211e78ce66a1292629b244babb3159969d4ba028378db8412aeb7dedc9f17746367ceb00c022e29118216be4600dd42251e8ef7170d401faadc5b47951029880e35849", 0x5a}, {&(0x7f0000001200)="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", 0xfb}, {&(0x7f0000001300)="b5005f0a4cface46d3efb17b5c4a1e11d6b0e16f34da41c71024c38d2ca0a606640d683f7a0d4ecac925ecf0f1200776a19d3cde1f77dfcb63482eb3f923f27f2d1b66bb552f44d549a1f321349c301c65c21b6c79483ea17a9b66f8f1d2695eb8d516ee47dd85bf8d638961f30f6e025c9e5ca2099ece0a489dc45ec3003d497eaf077ba53feea6bf526cad585cc219904c55f472e089f3d0a23844054f05dfa39024434e3882166f0203fce5b2cdd7736c5cc0ce086c0a0ed0518a316e6da21d6a0e09bf04e67f377fe29afad1612ff3b4f965f155e04e0595418f8890cc3d0de2b6be076b0d83b641962746952f0deaa82677a097c2d18d1fdcb968c59a5d67dfc0b1855a981e1991e80095153c62337c2b177d7a30a3045d5ad399d51884b3ffd70b217895fdf869ba61d9cdc8dd931d4e932af8fb18bc416b226ddd21c899832f55ff8a5b40d8376b7f9be99463542f15138009a995d7e222d6797e0849188bf1917458f26cf08d5d7c255309fd20e4ef9804265424ad229cfa256335ed09b5f02901b4523abdf03830fe890e03058c903246ce437ee5dc3fc34cf7539008f54b2e5c85e0c15a97572c2c2a277943dbafb4847d5114da539d0c73c7436da25bd3e609988470829fe192b05c0eccfc42b49e67a3a2bf62ee61cb97b8e507e672d9a2e3591ca2c1847abf0f38de22c9f36e59c4b980f12238e9874e5e7a829cf0fc823b31d3c7006b5995a895dd8a66568d040f7e8c1df3cbbf6bb610ccb988bdb04ef2692b7c7b9ff20f6b8d0d3a4fcc6aaaa2b2d0c03a1c98045bcc87f3e099d625d194eee910d45b17edadfd7104f021c75d128ceb88ee0f329ba18e4a64b43a620d4f507d85885d7e20988fdffafafb266cb61f0290b41a891ccb596d0a89246aa552f11e4999128e1b2ddad68b46930fa1e17fb583eca43253f1083c1e6b47e5628aa38d20d8fe73607c14b8532362c4769a275b5cc19049fe9588df4e59caf6910a3cdf7763b4911ce1c9a00bfefddd84d8a2cd0e46fea493eda68c7c03be5add56496212ce9cb92859d275533c674c826d4ced44f9c87f0f151881b3ee36bc9246cff0f42534ce391b36edeff9b0cb8ba73be29752f58b041638faf4745f4c09f6fec49dd666ba3d173fbf6d8222a2a4d2b73011bc2f7a9f37cb1a1c068a7216af368701d044df9a8ada729c061176bc94657b09ed8dc4dc870b6551c5a1a621f531a67d71eea548d803c1c690cbb8dc3df254dadf5cf654391c43ded1051c9f02b4186c4b15f356e5a9ec8b591c4e62a06aad60b5bc806b3df5745aba9b939afd2258edee6b401be8545c6c347ec8ef0c207b6f42ae77f169c62d4445b5d71d690718e8b93db59c0793a9c43df2ce1ce62eea01145edaf551cfd255fb28ff91d71260be4677fc2da1f1ab180c36052921d42e3f5192e8b17beada6b9e6ac3d2622ea7859c26f4aa368e5c5d62a2bb39e45ba9439132a8967d88d848c2e0b9631017be8178e4a6e812e2343da912c7efabb560b2fea2fd72221e2631462506fbc07579b48b7c3fb37d5a950e8b604f2b96a158bfeb57923e140d776298894da8905b66e763823659ba1271bbdec9b125ae1325723cdda4b614918c7e77dfbd2207ba6df4ccefc88462736c0f497ca7ce6fc2ee34055070c0ded88a86617eeee3508a7b82bccca92d68affa657b81f8a527e8ab46fd2107e1a933b811a6968c173f89a504ccc1cf0f8148c0273f6b228d3c6c97cc03425a81f5759e32e8a797200d05778414a27907d0275a19e80bcae1118d964c6379caed36de101660f29990cdaef5073dc5f264c5343dfecd63e15efabd8a6815e5258a3316dcb6275934c576c3d30df8234e8a5f1d94d746a0659106dd2605801d77938e9f5e38fc04f01d380ec82f4fb8ca57449872629993a77347adb9737d0b8b54ccff0d834447f295fb86957df4ba91ad7402fd71126414f4e472f2b8ddee874c92b407e51a2bd3a72372b0fbd8f71abcf6d4ff0ea1198390da38cb2a24478eff507d90729abc925704f6c4bf78e4eafb9b50759198d83b8248cc93680f80a93139cd00bf0722a3eed7cd661c34a36adfe46bf948dc5f73ca0a94638560c315082cc427922c5c0a244255d8e3e1f6993f2be200f74f370a388abb652d40940db6fd458114b47ba5c704697a85b8a395b341934a449528e2a5b0481e37b6b5b75b2bf27983b3a5804a6512a644a5cb812d1edcdb1aa8f5751bf360c5e76bd2199f5932728f0046313da4679c6d7c7c4b19843ab86a6e012d12f2674d19c1376946411f0410cd5c650aa2ee32559971b6c2e2285c70260081d7f1a4ca27af9d500e364d4bc051ccc7240ca2f46b9d83d7992ec6f2b1f8e21a7f5d8325af9ed5693ddb1d064633a715440553ed57a663fa0c59e58b1bd2e9e729f85db6af170b22ff0912b20e1ae580cbdeafb4f6eb46da6344aa89df89b8475101fd40a2f9d9597e7170ea71279a817b84778930752848777c98d4710fd42b7ae7318ade3352b77818b56962763d1a5bc2053d21faeac27665f8aafd96ac21cdb0afaf78a6bf853ee6faa4f1db2240212e564cebf985c438a4ec1ab8eed632bdb7fddea987ff4c76a2bd0ec3c13f1583206be5da89e5dae9c7b34b5b9bca2742ca3ab4ffe6476a81f79451185d0891fbc1e86e8bdfb39c2f7b7f1dd174aebb5fc82d57483abffce9d8bede83c95bc5f89ac4b2c24afe27af2bca249160b75ece0232a77588151766398dfeeeb5e9ff538d25b27467682caed54e7f9fd9db1a5cf1bfc66a6332b7c60c6768cf63c57fe2af8edaab69a8b997010683c5722fda643ed06891e572936c184c90a30a5c5f6bc4b1f9189914965052717f8b8bab2b5bb350a2ad77042898f40c0a6e2da12c3070abf103c31e4e52c88d46013ab1bf6328566e4da2a31cfb4466b8b11f399bf99b16cbe41b119f69aae04281504eed4bb692dcadae0f8df0fdcb7f4715f9fa751390e0c0a0203f7759a3b55dfbcc78a03f8698266f979bd82e49c800d741922bac45c06ca37bfaac1542d9e6413fad4244df202540960fc722f402d176f4f920716e71fc13bcec1bc5b3d886783f76b9585fac1d95639d80e19e5a25d891f403359f9f23f2d32e9ba0f1f76defe3fbf2badb3f74abd1af6ecdd95f4dfc3fe5bc4b241560dc19f599ef68d88fcfe59c70877ab58a48b9b6efe44cc6d5913954e707333c0515bc0bc2320afd898624dcbcefe96097ed0351726d59b7b332a0ef31aea0a848107210827d8028dd5714cb258d275b080ee61d57657b9b61e7ba7d9d13dc4d59947c0761a6cd454269678a9cf6dbb9c5bd758f11da94526a1bd1c972c23fc251d6f6870a89d13c8e1c4073e2a79d6e14135899572dc2062b9b16273aa67ca89210310e01d0d9465eadf80e42da5cbd662c28bae1a6ba33b4098261dc9990ca19aa05ceb3b33cadf1a7a9b2b01e5018f8fc60338fd8d4779ac68ec396243e3a35026f4d65342df9f5efffd4be3ee99f866a5c552630f10a557581dfbcda29671e2747002aedeaabd3fbb79eaee9a26c501fd802cd58ceeba1ea95dd3735393c00896f69e2ba09de278cef085719afa8c41a2c23444f31f9b372867869e1a25dc80019b127c0edf8908f4dfce0f0750b0c7bc8391deae64f8ba2d6f67bb368d2c5b1c77d1e5ee9400d90c11fbc6e7b6e33cb27e81fad36714f9fc9d24e4df0f353d954c6e2825a20dd15462d7dc364ed3a55fe8f7b16933f692f4870e48d98a0313361ab61e473c340dd5a794f9115ca4a362d2d5368898a669748f2a958a640d977cc9265c1e93b8402f6cd176e753e792838f6cc7e3284c2eaa11fc540ff10b9193bd88c338d3273673e2f021dbd64a9cd9e487caefc2dd036812b8003fe56420265086a6809d84b9523c4239bfa4fa7b4370f221eefbb22c8f5d8101c5b9f800c0cf4c881315564e1604e3597e156d16426f04b80142eb6b880f23df6b9d29a9849c8c336479ee8976d78334520160999af887e011f3af4d0750a480506d6e72670612885c2751f703f477df569f21b7f68b7626b25bfd247e4a926efaa8083f0d7e91b2aabc0f7747b85c138ae87e0562bc6333b390e537e0477dc1e6badfeac66810dfb3f71977efa6efe0be9a0ae1750b811dd7fd4abfa5bf88c2cdf6e5ec63d8ed321aecbf4cd22e4e884126cfe4f07dd6dfa13535756cc68905631c61470af427f9ebbc0a0035e84c662af132311b292054e39b8cd898e79d57ec55074dadca01855f55adac945c406dcc165826abd46af249cbee1cef6ff5db36614f9ac83eac25fcbe062cc7aa6f66135539be03f9ccc9df9cc1cf3a4f77373d1175941b18c25787a0a1db58d3f312795403df7ed6ff8b5409c146a7629535dac3f3d5199d97569adf236ab6e23f4ea7256f6c0293ebaf7716460b54e767cb731697b8be84a716b494c4bc24f3bc3d6986f9baf131b384c235f327dece46763967687fa0852862034ca9da07be56851297829c6e5836bf44bcb146e75752266deae5275956f16fa1e8d656d1a1767089a123985af5d3b0a92fe6abda07132d87865455215ea5fc81af1699e834a2bf5436c1c13ff2b5913dd25f0e97342125e03e04685bc1477781279962803de0bea480f86a2082f08a2df5bf122bbee1dad1d9bdd4efc2207986021c1d79c0d6ed2f2df3c32a24f69f5e38ecb04ec40e6f572ee6dd7b9cbcf59cf6c335b22a61430d87ae4f7892d3b21a64b419fe10d432f7dd742a2ff58d8028d8c31372e99c54eac53f37460bcf86525d0bb2b847f3f4f89f36202b4f1bfeb4cd645c003840d5d0d03cda27b34cb8599ff04ccb58d327ca83307e477d6527feb0cf6a0f6202988799f0f37828654a65b289a13aac3eb6e28109e99280e092d696b3c53b6f36a8b59f92eba2df7da3bbaf0d44a16410711881d02116ecb87e7cb8a72e54361a9e16059bb7018492699d66d6f6e165f6897a3421982940c27988475a3eb58714efbffb1f8973dcdf1f74dbd74f120900bea59a7d6c430dc50b66dd4291307a4732f191bebe42c691c1becb7778d3f2c64a099064fec7422ed24b684912988b2a3960996ff1f6abe1a08129cf5c2d4f825da804c55c097a283307b81158663e7ea0494ff42ffe9af7c75c16f5a27378b4d2b62a500765f221bc446879c36d17ae075a225d4a29e808eb9b769c9e9b876f8de7466447f2fa0ac4690b7b5920be6b4c7bde62af5536f8c921c00766cc94a7dd5c7b7f1a910f8f0019991d409369ead5dc51ed0c7d7e2057a91ca208aca32aa9cf5d58416059e62238806b32486d917a08123cc152da717aa46fd085fcaabc54057e854c3c39e6a5a64740eea537eb1920fcc08fe060000736399e319617ad82caa51278d0654c81084b32b8f098798a5fc932c86216ce7e3b5d791c9843a7dec945e6d01cf8b31370d5555fbd86a22a80db61a4e18cd35cb4aa76d056c9a11a676501bbc33e1372c82a9c4f8a1e0e36ee907ee5df0a044638c6da3d075809407a0714e3e22f147dd968246f635a65e3f0b9fd8a3c6c818ff52118c8976b87052630ffd8d6d6eda5d25ebc4ec90cda7d059595ecead6ac25392d15796a04e15319f0089294d2c721a1e4d37a5068f982929bb2c5166085d15d154bc588876ee3750272085b997ce5251d78b240ed790b89fc378004ad024fc228dd268b1b856c0d3880744ec7f2603b73d9dfe7ff3333fdf671fd74a1744c583ff87b9ae3eeddaa3ad65300d0f2d6adf9fec990ccc063126d80c5485e090820159", 0x1000}], 0x4, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r1}}}, @cred={{0x1c, 0x1, 0x2, {r2, r3, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r0, r6, r0, r7, r0]}}, @rights={{0x2c, 0x1, 0x1, [r8, r0, r0, r9, r10, r11, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r12, r0, r13, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r14, 0xee01}}}], 0x120, 0x4000004}}, {{&(0x7f0000002840)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002ac0)=[{&(0x7f00000028c0)="78185580cbb2092977a71758dac378e5a898db5d74e28c6bff17e9da09f3c8780dcaceb6498fdd83cabd349c1f68b991ca7bced0b6742ec8b5e9300e0bdb26d2075dbeae085a1ec19f335a718f068b19c2d5af1faaf7ea07684fd35a674125d2b0d558e68db8d2e5ba46c33bf7d9ea28ca73fb5934795f42ac73dc028452934d6dbedca0a336a4f66bc7e25fb87d3755b0ab04bc3b43956a9c89ab62a439b8a999861a0de29203469182e4eb50a93171154e69a1f293c35da8eca426eb8f4a06c794623a278eafd4bf61dfa4f293b12eb9", 0xd1}, {&(0x7f00000029c0)="bfbeb0331f19556fd08201e35d7144177d69b04c77fe002c587fa6c8dca028f43fa6ae89ea8f4e3ba666713624dac7beaffc601b99b7bd57400f8c17119c85979ae18151bd5edd4b45bf328b43cf1df808d0a4f8a2f58edf112a25151f70f7f2175309bf3035043d0e58af81b4a11cefe982968509638362fb9d5f0a17767bac2144b23800f2dbda5c08aacd5428c50923952bac45dcea2418268c9e2a5210a1c05aa8831561e913b4785b58dbc5c523eb1e1a436bddbe2e89909e4ed85febcc64b879cc13dc73bd1f10", 0xca}], 0x2, 0x0, 0x0, 0x40840}}, {{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000002b00)="2a2062b6f3c7efc71594e61383a849ff", 0x10}, {&(0x7f0000002b40)="8915212867e978915348fd0b5afe", 0xe}], 0x2, &(0x7f0000002d40)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r15}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x2c, 0x1, 0x1, [r16, 0xffffffffffffffff, r17, r18, r19, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r20, r0, 0xffffffffffffffff, r21, 0xffffffffffffffff, r22, r0]}}], 0x98, 0x8c0}}], 0x7, 0x20000000) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) getpid() setreuid(0xee01, 0xee00) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5008, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x110, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) setreuid(0xee01, 0xee00) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:36 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) getpid() setreuid(0xee01, 0xee00) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0xcc, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0xcc}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: setreuid(0xee01, 0xee00) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0xc4, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}]}, 0xc4}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) getpid() setreuid(0xee01, 0xee00) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0xbc, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) getpid() setreuid(0xee01, 0xee00) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x1fffffffffffa, 0x0) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) setreuid(0xee01, 0xee00) 16:48:36 executing program 1: prctl$PR_GET_NO_NEW_PRIVS(0x27) setreuid(0xee01, 0xee00) 16:48:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x88, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}, {0x5}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:36 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x6c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 1: setreuid(0xee01, 0xee00) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x108, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:37 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2bfa}]}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x14}, 0x14}}, 0x40) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}}, 0x40) 16:48:37 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x14}, 0x14}}, 0x0) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}}, 0x0) 16:48:37 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) socket$inet_udp(0x2, 0x2, 0x0) 16:48:37 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) openat$nci(0xffffffffffffff9c, &(0x7f0000002d00), 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a5e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) ptrace$ARCH_SET_CPUID(0x1e, r2, 0x1, 0x1012) pidfd_open(0x0, 0x0) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) ptrace$ARCH_SET_CPUID(0x1e, r2, 0x1, 0x1012) pidfd_open(0x0, 0x0) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) 16:48:37 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') r9 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r10 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r10, 0x0, 0x0) r11 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) r13 = perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)="8b178403966b48acc1769880fe7ab85a27d0d6fff34a13dbe54f9d8e636f2a0f048053eed7b1295a9c5e9411cfd66de9", 0x30}, {&(0x7f00000000c0)="64861a139e5790e43b0c53a6273b039fe12e99c6bd028e7e62826d7dcc58e2e9d220698edc52ed4d84506f1645fbd40b9eb971ee7dd21368132de4226eaac279999df1dee1b7320a87c8f8964be70450fa63d3a64b8e666a058bde24757cb13d869210c824bb32bf71e28ba9a115e9a41aaa65c7f3ba5a3d987d2c5f9385f6466e2778cb510e62be8dbbcd9d42a8042ee454afb7d712d4380444317e497c", 0x9e}, {&(0x7f0000000180)="f90e3542ccebc58e898fcc222331c5c3a73a1bbed1ce7c6e670227af244b8e0ebbf125b3cc1a73e4fdaf3da58f9fb9ef2d1929c3b643d3600813ec0c0e11b887d85f6de93fb2d7d32ee716ebafd7b4a7be92402e6f1142c09a7ed1d0135aa0e7270e26e65845638f8d8b86f684ebc852148ab08b6a8158e90b363d8d7a8bd13adaad19cf55179e818d62e5a2a853f9e25494f0eb6a2913bf2e6fe318805d42a4e3796ec798622ecdcc5796a5a1f270322378c2ea6be96e0e68555ac6ecced2961b04626c8eb251e65c7682d00d35120960603bd773aa2714ba2b77ad485201d3811aa1c3aba5ca9b", 0xe8}, {&(0x7f0000000280)="ef4c5caa610c3968febd1c932ca72f48dd321758114a0555b2d98c4711a708f55c1d6b27365bf13c311d8ca28e5e537d067a84a20facdab92084f5fdb52a21c5fdcaef28ae38a10575a492f82e50496218c1d3aa3a50f5f77f618d49ea5095bcc631e7c4561d", 0x66}, {&(0x7f0000000300)="bd847564bf05e8ecc2a48d", 0xb}, {&(0x7f0000000340)="8559c49ac725475e5f53dfeb73dba9cfb43edf58cd2253fb1dd57ac1e601df2a6b40d8cf7fe0333967c9a4fe8e68", 0x2e}], 0x6, &(0x7f0000000b40)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r1, r2, r3]}}, @rights={{0x2c, 0x1, 0x1, [r0, r4, r0, r0, r5, 0xffffffffffffffff, r6]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r7, r0, r8, r9]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x118, 0x4000000}, 0x8000) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30364e05}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000002cc0)={{0x1, 0x1, 0x18, r0, {0x4080}}, './file0\x00'}) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) ptrace$ARCH_SET_CPUID(0x1e, r2, 0x1, 0x1012) pidfd_open(0x0, 0x0) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}, {&(0x7f0000001240)=""/61, 0x3d}], 0x5, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) pidfd_open(0x0, 0x0) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) pidfd_open(0x0, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) getpid() pidfd_open(0x0, 0x0) 16:48:37 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x46, 0x4, 0xc4, 0x1, 0x0, 0x0, 0x402, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x100000000, 0x3f}, 0x0, 0x4, 0x6, 0x9, 0x6, 0x7ff, 0x6, 0x0, 0x22e0000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) r2 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r2, 0x0, 0x0) pidfd_open(0x0, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3852}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000002c80)={{0x1, 0x1, 0x18, r0, {0x123b, 0x57ab}}, './file0\x00'}) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) getpid() pidfd_open(0x0, 0x0) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}, {&(0x7f0000001200)=""/56, 0x38}], 0x4, 0x0) 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getpgrp(r0) pidfd_open(0x0, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() getresuid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) 16:48:37 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x4, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000840)='syzkaller\x00', 0xad7, 0xbe, &(0x7f0000000880)=""/190, 0x40f00, 0x43, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xf, 0x7ff, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x6}, 0x90) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {&(0x7f0000001100)=""/226, 0xe2}], 0x3, 0x0) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x128, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x20, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) getpid() 16:48:37 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) getpgrp(0xffffffffffffffff) r0 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r0, 0x0, 0x0) pidfd_open(0x0, 0x0) 16:48:37 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) getuid() 16:48:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:37 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:38 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) getpgrp(0xffffffffffffffff) getpid() pidfd_open(0x0, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) r4 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r4, 0x0, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:38 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) getpgrp(0xffffffffffffffff) pidfd_open(0x0, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26d5fbb4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) 16:48:38 executing program 1: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x8004, 0x0) pidfd_open(0x0, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) getpid() 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000026c0)=@generic={&(0x7f0000002680)='./file0\x00'}, 0x18) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:38 executing program 1: pidfd_open(0x0, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) getpid() 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) perf_event_open$cgroup(&(0x7f0000002600)={0x0, 0x80, 0x5, 0x89, 0xff, 0x2, 0x0, 0x1c64, 0x3e10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000140), 0x1}, 0x5008, 0x10000, 0x7, 0x6, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffb, 0x0, 0x4a3}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xc) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2338}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) open$dir(&(0x7f00000025c0)='./file0\x00', 0x10001, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000002500)=@abs, &(0x7f0000002580)=0x6e) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000024c0)='io.pressure\x00', 0x2, 0x0) 16:48:38 executing program 1: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x34, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000002480), 0x44c002, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) getpid() 16:48:38 executing program 1: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() r1 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r1, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 1: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:38 executing program 1: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x25, 0x15, @void}, 0x10) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() getpid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 1: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x13c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 1: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() getpid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x811}, 0x40) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) getuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}}, 0x40) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) 16:48:38 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000b40), r0) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000002140)={&(0x7f0000001f00), 0xc, &(0x7f0000002100)={&(0x7f0000001f80)={0x144, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x3c, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}]}]}, 0x144}}, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) socket$nl_route(0x10, 0x3, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000002440)=@o_path={&(0x7f0000002400)='./file0\x00', 0x0, 0x4008}, 0x18) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 16:48:38 executing program 2: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:38 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0000281d7e00000000000000000000000000007d37d769699fdee92977de420ffe888a503a8183db7bca9056f9ab0bb6db517f50a83db7c58e1daf1566376f55373dd31bae46bc00ab50ab777e942355037f82efeeb93645b6f6fa0163a52ff32942b9a9da29c63f47", @ANYRES32=0x0, @ANYBLOB="0007001000000fff000000044e800038006700000029907800000000e000000144246b717f000001000000030a010102000000077f00000100000081640101020000001f"]}) 16:48:38 executing program 2: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0000281d7e00000000000000000000000000007d37d769699fdee92977de420ffe888a503a8183db7bca9056f9ab0bb6db517f50a83db7c58e1daf1566376f55373dd31bae46bc00ab50ab777e942355037f82efeeb93645b6f6fa0163a52ff32942b9a9da29c63f47", @ANYRES32=0x0, @ANYBLOB="0007001000000fff000000044e800038006700000029907800000000e000000144246b717f000001000000030a010102000000077f00000100000081640101020000001f"]}) 16:48:38 executing program 3: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:38 executing program 3: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0000281d7e00000000000000000000000000007d37d769699fdee92977de420ffe888a503a8183db7bca9056f9ab0bb6db517f50a83db7c58e1daf1566376f55373dd31bae46bc00ab50ab777e942355037f82efeeb93645b6f6fa0163a52ff32942b9a9da29c63f47", @ANYRES32=0x0, @ANYBLOB="0007001000000fff000000044e800038006700000029907800000000e000000144246b717f000001000000030a010102000000077f00000100000081640101020000001f"]}) 16:48:38 executing program 2: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) 16:48:38 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:38 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:38 executing program 3: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, r1, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 3: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 0: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 0: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 0: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x501000) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0xffffffffffffffba) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:48:39 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, 0x0, 0x4040090) 16:48:39 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, 0x0, 0x4040090) 16:48:39 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, 0x0, 0x4040090) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x5, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0x9, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 5: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 5: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 5: process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x4, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040), 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 5: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 5: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x3, 0x0) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, &(0x7f00000004c0), &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, &(0x7f00000004c0), &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000001080)=""/69, 0x45}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 5: getpid() process_vm_writev(0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/pid_for_children\x00') 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x0, &(0x7f00000004c0), &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000500)='GPL\x00', 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x5, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x9f, &(0x7f0000000540)=""/159, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1a0, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MLSLVLLST={0x184, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3b3f2533}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x637f9078}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5101f8a6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2e587434}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4945f755}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8f}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x53}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412dde7d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1883fd71}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x74}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d457ec5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b052441}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2404e7ca}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1d}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11e8c075}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x28}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x61}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdb}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xee}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x41}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f759825}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xcb}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f70df7c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x8e}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b995857}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4e0387bd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2d}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6b25cfe9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x673edc21}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b77ff56}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x51}]}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040), 0x0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd}, 0x20) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x20000890}, 0x4040090) 16:48:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:39 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:39 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:39 executing program 3: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x5, 0xa, 0x3c51}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:39 executing program 2: setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x4040090) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{0x0}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) 16:48:40 executing program 1: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, 0xffffffffffffffff, 0x18, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 3: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map=r0, r1, 0x18, 0x20, r2, @prog_fd=r3}, 0x20) 16:48:40 executing program 2: setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:40 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9a1220c3}, 0x90) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 2: setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x2, &(0x7f00000004c0)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0x1}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0600000000000000ffa563dbc178c10a"]) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 16:48:40 executing program 3: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 16:48:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}], 0x1, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}], 0x1, 0x0) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0) process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}], 0x1, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}, @generic={0x6, 0x1, 0xd, 0x2, 0x401}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/10, 0xa}], 0x1, &(0x7f0000001280)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x18, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:40 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x4, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 2: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, @prog_fd}, 0x20) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}], 0x8, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}], 0x7, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 16:48:40 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}, {&(0x7f0000000680)=""/10, 0xa}], 0xa, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x4, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}], 0x4, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/244, 0xf4}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='GPL\x00', 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}], 0x8, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x7f, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}], 0x7, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x41000, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:40 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:40 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}, {&(0x7f00000005c0)=""/164, 0xa4}], 0x9, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:40 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}], 0x4, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:41 executing program 5: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x3, 0xe, 0x4, 0x401}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/50, 0x32}], 0x8, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000100)=[{0x4, 0x3, 0x7, 0x3}, {0x6, 0x4, 0xf, 0x2}], 0x10, 0x3}, 0x90) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/71, 0x47}], 0x7, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xa, 0x1, &(0x7f0000000000)=@raw=[@jmp], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}], 0x4, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 2: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 2: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}, {&(0x7f0000000480)=""/78, 0x4e}], 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 2: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 2: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}, {&(0x7f0000000380)=""/234, 0xea}], 0x5, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}], 0x4, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}, {&(0x7f00000002c0)=""/153, 0x99}], 0x4, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/221, 0xdd}], 0x3, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:41 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:41 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:41 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:41 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 4: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:42 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:43 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:43 executing program 5: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:43 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}], 0x7, 0x0) 16:48:43 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}], 0x7, 0x0) 16:48:43 executing program 1: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}], 0x7, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}, {0x0}], 0x7, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, 0x0, 0x0, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, 0x0, 0x0, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {0x0}], 0x6, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}], 0x5, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, 0x0, 0x0, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 16:48:43 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {0x0}], 0x5, 0x0) 16:48:43 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x0, 0x9f4}}, './file0\x00'}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 3: process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {0x0}], 0x4, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x0, 0x9f4}}, './file0\x00'}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0) 16:48:43 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x3, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}], 0x2, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x0, 0x9f4}}, './file0\x00'}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:43 executing program 3: getpid() process_vm_writev(0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}], 0x3, 0x0) 16:48:43 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:43 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}], 0x2, 0x0) 16:48:43 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}], 0x2, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}], 0x2, 0x0) 16:48:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}], 0x3, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, 0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}], 0x3, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {0x0}, {0x0}], 0x3, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}], 0x7, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x2, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}], 0x6, 0x0) 16:48:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000825) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}], 0x5, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x2, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x2, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}], 0x4, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x3, 0x0) 16:48:44 executing program 0: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{0x0}, {0x0}], 0x2, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x3, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}], 0x3, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:44 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x1db4fda9) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}], 0x2, 0x0) 16:48:44 executing program 4: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000840)=""/167, 0xa7}, {0x0}], 0x3, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 2: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={0xffffffffffffffff, r1, 0x1a, 0x0, @void}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000010440)={r2, 0x0, 0x25, 0x6, @val=@uprobe_multi={&(0x7f0000010380)='./file0\x00', &(0x7f00000103c0)=[0xd516, 0x8, 0x3, 0x5], &(0x7f0000010400)=[0x3], 0x1, 0x4, 0x0, 0xffffffffffffffff}}, 0x40) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'sit0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x7, 0x7, 0x7f, 0xcf, {{0x5, 0x4, 0x1, 0x21, 0x14, 0x67, 0x0, 0x9, 0x29, 0x0, @loopback, @local}}}}) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000209c0)={'syztnl2\x00', &(0x7f0000020940)={'ip6_vti0\x00', 0x0, 0x2f, 0xff, 0x1f, 0x2, 0x2, @ipv4={'\x00', '\xff\xff', @local}, @private2, 0x1, 0x7, 0x8, 0x9}}) sendmsg$nl_route(r1, &(0x7f0000020a80)={&(0x7f0000020900)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000020a40)={&(0x7f0000020a00)=@bridge_newneigh={0x24, 0x1c, 0x1313, 0x70bd2d, 0x25dfdbfd, {0x1c, 0x0, 0x0, r5, 0x80, 0x18, 0xb}, [@NDA_FLAGS_EXT={0x8}]}, 0x24}}, 0xc000800) sendmsg$L2TP_CMD_SESSION_CREATE(r4, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0xe2f}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000102c0)={0x2, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000800000000000000000001008520000002000000180000000000008ecf00000000000000180000001f0000000000000005000000"], &(0x7f0000000040)='GPL\x00', 0x9, 0x20, &(0x7f0000000080)=""/32, 0x40f00, 0x20, '\x00', r3, 0x1b, r4, 0x8, &(0x7f0000000180)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x4, 0x0, 0xe2}, 0x10, 0x0, r6, 0x1, &(0x7f0000010240)=[0xffffffffffffffff], &(0x7f0000010280)=[{0x1, 0x1, 0x6, 0x9}], 0x10, 0x5}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000010580)={'vxcan1\x00', 0x0}) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r8, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000010640)={{0x1, 0x1, 0x18, r0, {0x8001}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r10, 0xc0a85320, &(0x7f0000020840)={{0x8, 0xca}, 'port1\x00', 0x44, 0x100d, 0xfffffff8, 0x2, 0x0, 0x6, 0x6, 0x0, 0x0, 0x5}) sendmsg$L2TP_CMD_SESSION_CREATE(r10, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f0000020680)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000020780)=@bpf_ext={0x1c, 0x5, &(0x7f0000010480)=@raw=[@alu={0x4, 0x1, 0x7, 0x2, 0xb, 0xffffffffffffffe0, 0x10}, @call={0x85, 0x0, 0x0, 0x82}, @exit, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000104c0)='GPL\x00', 0x0, 0x62, &(0x7f0000010500)=""/98, 0x41100, 0x64, '\x00', r7, 0x0, r8, 0x8, &(0x7f00000105c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000010600)={0x3, 0x2, 0x8b1, 0x4}, 0x10, 0x5895, r9, 0x7, &(0x7f00000206c0)=[r10, r4, r6, r11], &(0x7f0000020700)=[{0x0, 0x3, 0x0, 0x5}, {0x3, 0x5, 0x4, 0x5}, {0x1, 0x5, 0x8, 0x3}, {0x4, 0x3, 0xc, 0x2}, {0x2, 0x2, 0x7, 0xa}, {0x3, 0x1, 0x8, 0x2}, {0x0, 0x2, 0x3}], 0x10, 0x8}, 0x90) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}, {&(0x7f0000000c40)=""/85, 0x55}], 0x9, 0x0) 16:48:44 executing program 4: r0 = socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000c80)=0x6) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r3, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000f40)) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}], 0x7, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 2: r0 = socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000c80)=0x6) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r3, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000f40)) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, r3, 0x1, r4], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}], 0x6, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}], 0x5, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, r3, 0x1, r4], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 2: r0 = socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000c80)=0x6) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r3, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000f40)) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, 0x0, 0x0, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}], 0x4, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, r3, 0x1, r4], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 2: r0 = socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000c80)=0x6) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r3, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000f40)) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}, {&(0x7f0000000c00)=""/4, 0x4}], 0x8, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}], 0x3, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/158, 0x9e}], 0x7, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r2, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r5}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, r3, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}, {&(0x7f0000000b00)=""/32, 0x20}], 0x6, 0x0) 16:48:44 executing program 5: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}], 0x2, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, r3, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}, {&(0x7f0000000a80)=""/120, 0x78}], 0x5, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002204}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)={0x704, r2, 0x10, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r5}, {0x2c4, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xf1, 0xfd, 0x3f, 0xfffffff9}, {0x7, 0x3f, 0x74, 0x8001}, {0x82dc, 0x7f, 0x1, 0x73}, {0x7ff, 0x0, 0xf5}, {0x0, 0x3f, 0x4, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x48, 0xfd, 0x800}, {0x2, 0x7, 0x1, 0x3}, {0x20, 0x1, 0x1, 0x7fffffff}, {0x8, 0x2, 0x1, 0x7ff}, {0x200, 0x2, 0x9c, 0x5}, {0x8, 0x0, 0x9, 0x33f}, {0x9, 0x15, 0x1f, 0x7f}, {0x3, 0x29, 0x80, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x84, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x54, 0x4, [{0x1000, 0x5b, 0x3, 0xdd}, {0xfffd, 0xe1, 0x3, 0x6}, {0x5, 0x7, 0xea, 0x9}, {0x1, 0x1, 0x4, 0x7fff}, {0x4, 0x4, 0x2, 0x40}, {0x6, 0x4, 0x28, 0x2}, {0x646, 0x40, 0x4, 0x92}, {0x2, 0x81, 0x27}, {0x3, 0x2, 0x11, 0x80}, {0x10, 0x4, 0x7, 0xfffffffe}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffff9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8}, {0x28c, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x9, 0x80, 0xfc, 0x3}, {0x1, 0x7, 0x20, 0x7fff}, {0xf282, 0x9, 0x1, 0x3}, {0x1, 0x81, 0x3f, 0x1}, {0x7b, 0xe4, 0xf, 0x536}, {0x10, 0x77, 0xa, 0x6}, {0x0, 0x9, 0x40, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x444}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffff80}}}]}}]}, 0x704}, 0x1, 0x0, 0x0, 0x4000}, 0x4000041) 16:48:44 executing program 5: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/13, 0xd}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000040)}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f0000000140)=""/90, 0x5a}], 0x4, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000400)=""/189, 0xbd}], 0x1}, 0x40002060) sendmsg$L2TP_CMD_SESSION_CREATE(r0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000240)={{0x6, 0xba}, {0x0, 0x1}, 0xb16, 0x5, 0x80}) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) getpid() getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000b00)) getegid() getgid() getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) r3 = getpid() ptrace$PTRACE_GETSIGMASK(0x420a, r3, 0x0, 0x0) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 4: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x15, 0x7fffffff}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r1, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[r2, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="73797a746e6c3200da3284385f515ef502420cb1159d5b8f6c5ae1d9bdaf289c8f11583d9b01410d6320884136eb56b806feed593b1d5cd06b57c6dfa182106200d26a1fd4774698357ffc3eb3d3d084f9ac0088c152802af03238ee8033421479ead5ab138e184c9b298abcc06707a6e9733751bb5d99ed16dcd922a7ec4567d343d59d4bee0100020084bcd6d176cf84377d80e6e1227b2fb7a056d83c7db1271997f2ebdca2060c6ae0491d7a27cb6ff25d8b0fa0e112053ca3f3858bf56c2981a770a00f353870a379268bc5cbe862bc2dd9903f0dbd6d0d58d5d01bf5dc319bc3a4a99a991f0c8e6adb0495ad7d00aac3ccb900132d92a42d66e7460f438ada8b3126fbbf62ec0adc1c882037ba9a1e3b1f2e14acd4ba2376ccd497b88884e4a1c59a86d3b4d32337268d98975be1486865a16956a29b28561c726f1a024e0a", @ANYRES32=0x0, @ANYBLOB="00070008000001ff000007ff4421005000650000060490780a010101e00000024418dd500000fe2600000d90000000080000000000000001000101891f8eac1414aaffffffffe0000002e0000002ac1e010164010100640101000000"]}) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}, {&(0x7f0000000980)=""/220, 0xdc}], 0x4, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x3d, 0x9e, 0x4, 0x6, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7800, 0x8, 0x5, 0x1}}) 16:48:44 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', r0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f00000002c0)=""/234, 0xea}], 0x3, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FILES_UPDATE={0x14, 0x18, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000000)=[r0, r3, r4, r0], 0x4}) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/113, 0x71}], 0x3, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) 16:48:44 executing program 0: process_vm_writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0, 0x0) 16:48:44 executing program 4: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000f00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000400)={&(0x7f0000000e80)={0x48, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x840) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/167, 0xa7}], 0x2, 0x0) 16:48:44 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0xffffffff, 0x20, 0x101}, 0x2f) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{&(0x7f0000000780)=""/188, 0xbc}], 0x1, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FILES_UPDATE={0x14, 0x18, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000000)=[r0, r3, r4, r0], 0x4}) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'sit0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x20, 0x80, 0x100, 0x7, {{0x6, 0x4, 0x1, 0x34, 0x18, 0x68, 0x0, 0x40, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@noop]}}}}}) 16:48:44 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0xffffffff, 0x20, 0x101}, 0x2f) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 1: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 0: write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0xffffffff, 0x20, 0x101}, 0x2f) 16:48:44 executing program 1: waitid(0x2, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) 16:48:44 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FILES_UPDATE={0x14, 0x18, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000000000)=[r0, r3, r4, r0], 0x4}) 16:48:44 executing program 1: waitid(0x2, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) 16:48:44 executing program 0: write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0), 0x0, 0x0) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 1: waitid(0x2, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f00000000c0)={'gretap0\x00', 0x0, 0x7800, 0x1, 0x9, 0x8, {{0x24, 0x4, 0x2, 0x5, 0x90, 0x67, 0x0, 0x25, 0x29, 0x0, @local, @multicast1, {[@generic={0x44, 0x12, "496a64d45b380d66269bc86409cc8e1f"}, @noop, @cipso={0x86, 0x1f, 0x3, [{0x0, 0xb, "543c3a61313daa5130"}, {0x7, 0xe, "d0ff3db151367a75b9cd866b"}]}, @ra={0x94, 0x4, 0x1}, @noop, @end, @timestamp_addr={0x44, 0x44, 0x93, 0x1, 0x4, [{@loopback, 0x6}, {@loopback, 0x8000}, {@multicast1, 0x20}, {@empty, 0x401}, {@loopback, 0x3}, {@private=0xa010102, 0x9}, {@private=0xa010101, 0x7cb7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1c8}]}]}}}}}) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:44 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:44 executing program 1: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x0, &(0x7f0000000080)) 16:48:44 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:44 executing program 3: r0 = getpid() process_vm_writev(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f00000000c0)=""/201, 0xc9}], 0x2, &(0x7f0000000cc0)=[{0x0}], 0x1, 0x0) 16:48:44 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) 16:48:44 executing program 1: waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000c80)=0x6) 16:48:45 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000c40)={0x0, r0}, 0x10) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) socket$inet_udp(0x2, 0x2, 0x0) 16:48:45 executing program 1: waitid(0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) 16:48:45 executing program 2: socket(0x27, 0xa, 0xfffffe01) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$l2tp(0x2, 0x2, 0x73) 16:48:45 executing program 2: socket(0x27, 0xa, 0xfffffe01) 16:48:45 executing program 3: rt_sigaction(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: socket$l2tp(0x2, 0x2, 0x73) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 3: rt_sigaction(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 3: rt_sigaction(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 5: r0 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r2 = getegid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, r2}}, './file0\x00'}) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 16:48:45 executing program 3: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) getegid() 16:48:45 executing program 3: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x0, 0x4, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) keyctl$negate(0xd, 0x0, 0x7e3e3d3d, r0) 16:48:45 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 16:48:45 executing program 3: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x3, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x1, 0x0) 16:48:45 executing program 2: socket(0x27, 0x0, 0xfffffe01) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0x8000, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) sendmsg$TEAM_CMD_NOOP(r10, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x660, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x1, 0x6, 0x59, 0x7fff}, {0x401, 0x6, 0x9}, {0x8, 0x3f, 0x1, 0x3f}, {0x7ff, 0x5, 0x1, 0x5f}, {0x0, 0x80, 0x7f, 0x8}, {0x3, 0x3, 0x0, 0x7fff}, {0x480, 0x1f, 0x3, 0x64}]}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x569}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8039}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x150, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r12}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x33, 0x0, 0xfffffffd}, {0x65f2, 0x1, 0x81, 0x400000}, {0x8000, 0x5, 0xe5, 0x81}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x4}}]}, 0x660}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) 16:48:45 executing program 2: socket(0x27, 0x0, 0x0) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x1, 0x0) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000040)='GPL\x00', 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000540)={'gretap0\x00', &(0x7f0000000480)={'ip_vti0\x00', 0x0, 0x80, 0x8000, 0x9, 0x1, {{0x1c, 0x4, 0x3, 0x9, 0x70, 0x67, 0x0, 0x92, 0x29, 0x0, @rand_addr=0x64010100, @broadcast, {[@cipso={0x86, 0x15, 0x3, [{0x5, 0xf, "89237d182340f2b0985a9455a4"}]}, @timestamp_addr={0x44, 0xc, 0x75, 0x1, 0x3, [{@empty, 0x5}]}, @timestamp_addr={0x44, 0xc, 0x78, 0x1, 0x7, [{@dev={0xac, 0x14, 0x14, 0x42}, 0x20}]}, @lsrr={0x83, 0x13, 0xef, [@multicast2, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x29}, @multicast1]}, @cipso={0x86, 0x1a, 0x2, [{0x2, 0x3, "c3"}, {0x0, 0x11, "a57841f33dd8981694ac0a38adab9f"}]}]}}}}}) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, 0x0, 0x1, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0xc3e3, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 3: rt_sigaction(0xa, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) keyctl$get_persistent(0x16, r2, r5) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 2: socket(0x0, 0xa, 0xfffffe01) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 16:48:45 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000440)) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) 16:48:45 executing program 2: socket(0x0, 0x0, 0xfffffe01) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) keyctl$get_persistent(0x16, r2, r5) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r4 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r4) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r5) keyctl$search(0xa, r6, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) keyctl$get_persistent(0x16, r3, r7) r8 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r6) r9 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r9) keyctl$reject(0x13, r8, 0x1, 0x1, r9) keyctl$get_persistent(0x16, r3, r6) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x5, 0x2, 0x20, 0xb8f}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 2: socket(0x0, 0x0, 0x0) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) keyctl$get_persistent(0x16, r2, r5) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r5 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r5) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000200)=[{0x3, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x3, 0x3, 0x4, 0xc}, {0x4, 0x5, 0x6, 0x5}, {0x1, 0x2, 0xb, 0xa}, {0x1, 0x5, 0xe, 0x6}, {0x0, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x0, 0x2}, {0x4, 0x1, 0x3, 0x5}], 0x10, 0x7}, 0x90) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) r7 = request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r8 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r8) keyctl$reject(0x13, r7, 0x1, 0x1, r8) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) r7 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r7) 16:48:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) 16:48:45 executing program 1: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r5 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r5) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r5) 16:48:45 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r3) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r2, r6) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) 16:48:45 executing program 3: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r4) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r6 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r6) keyctl$get_persistent(0x16, r2, r6) 16:48:45 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:45 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r3 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r3) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r4) keyctl$search(0xa, r5, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) keyctl$get_persistent(0x16, r2, 0x0) 16:48:45 executing program 4: rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:45 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', r3) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r5 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r5) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) r5 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r5) 16:48:45 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$get_persistent(0x16, r1, 0x0) 16:48:45 executing program 4: rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:45 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:45 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) [ 230.146848][ T28] ================================================================== [ 230.154967][ T28] BUG: KCSAN: data-race in key_reject_and_link / keyring_gc_check_iterator [ 230.163564][ T28] [ 230.165882][ T28] write to 0xffff888103d08e58 of 8 bytes by task 8172 on cpu 0: [ 230.173510][ T28] key_reject_and_link+0x18b/0x350 [ 230.178621][ T28] call_sbin_request_key+0x6a0/0x700 [ 230.183925][ T28] request_key_and_link+0x878/0xcc0 [ 230.189114][ T28] __se_sys_request_key+0x1d7/0x290 [ 230.194311][ T28] __x64_sys_request_key+0x55/0x60 [ 230.199410][ T28] do_syscall_64+0x41/0xc0 [ 230.203812][ T28] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 230.209696][ T28] [ 230.212002][ T28] read to 0xffff888103d08e58 of 8 bytes by task 28 on cpu 1: [ 230.219353][ T28] keyring_gc_check_iterator+0x64/0xd0 [ 230.224799][ T28] assoc_array_iterate+0xa9/0x210 [ 230.229818][ T28] keyring_gc+0x7e/0xf0 [ 230.233966][ T28] key_garbage_collector+0x3c7/0x8e0 [ 230.239252][ T28] process_scheduled_works+0x5b8/0xa30 [ 230.244697][ T28] worker_thread+0x525/0x730 [ 230.249282][ T28] kthread+0x1d7/0x210 [ 230.253355][ T28] ret_from_fork+0x48/0x60 [ 230.257768][ T28] ret_from_fork_asm+0x11/0x20 [ 230.262528][ T28] [ 230.264836][ T28] value changed: 0x0000000000000000 -> 0x00000000650dc5a9 [ 230.271930][ T28] [ 230.274236][ T28] Reported by Kernel Concurrency Sanitizer on: [ 230.280365][ T28] CPU: 1 PID: 28 Comm: kworker/1:1 Not tainted 6.6.0-rc2-syzkaller-00244-g27bbf45eae9c #0 16:48:46 executing program 4: rt_sigaction(0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0)) 16:48:46 executing program 5: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r1, 0x0) 16:48:46 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x0, 0x0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x0, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) keyctl$get_persistent(0x16, r1, 0x0) [ 230.290242][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 230.300287][ T28] Workqueue: events key_garbage_collector [ 230.306027][ T28] ================================================================== 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 4: rt_sigaction(0xa, 0x0, 0x0, 0x0, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r1, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) keyctl$get_persistent(0x16, r1, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 4: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 4: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 4: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 1: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 0: keyctl$get_persistent(0x16, 0x0, 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 3: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 1: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 3: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 3: add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: r0 = request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r2 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r2) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r3) keyctl$search(0xa, r4, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)={'syz', 0x1}, r0) 16:48:46 executing program 2: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r2) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 5: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', r1) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:46 executing program 5: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 4: add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', 0x0, &(0x7f0000000380)=',\\\\-\\-}.--.\'#]@\x00', 0x0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 4: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x81}}, './file0\x00'}) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r1) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 4: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 3: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 4: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 0: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:46 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 0: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 0: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 0: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 3: add_key(0x0, &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', 0x0, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 3: add_key(0x0, 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 3: add_key(0x0, 0x0, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 4: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 5: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 1: request_key(&(0x7f0000000bc0)='rxrpc\x00', &(0x7f0000000c00)={'syz', 0x3}, &(0x7f0000000c40)='id_legacy\x00', 0x0) keyctl$reject(0x13, 0x0, 0x0, 0xb45, 0xfffffffffffffff9) add_key(&(0x7f0000000a80)='user\x00', &(0x7f0000000ac0)={'syz', 0x1}, &(0x7f0000000b00)="e1", 0x1, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', r0) 16:48:47 executing program 2: add_key(&(0x7f0000000a80)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x9bG/\xea=z\x83\b\xda\xd3(\x14\x05\x97\x7f\xca\xa7:\xe5\xba\xb4\x87;\x96@\xee\x93\x18\x8b_S\xe9\x9bk\x86/`hm\x17\xc6\xe9-T\n)\v\xa2c\xfc\xfd\x14\t\xb4\xd2G$jz\x13\x98', 0x0) 16:48:47 executing program 0: add_key(&(0x7f0000000a80)='user\