last executing test programs: 4.060740963s ago: executing program 2 (id=2564): openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) openat$binderfs(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x4}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_BROADCAST={0xa}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x5c}}, 0x0) 3.900795596s ago: executing program 2 (id=2567): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x2, &(0x7f0000000200)=0x0) io_submit(r1, 0x0, &(0x7f00000006c0)) io_uring_setup(0x6de1, &(0x7f0000000180)={0x0, 0xe0bc, 0x10000, 0x0, 0x80031e}) syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="120100008010bd40820514009dbb0000000109022400011b00000009040000022a3e740009058bff7f0000100109050b362f"], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000180)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[], 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240), 0xc2882, 0x0) close(r5) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3}]) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r6, 0x112, 0x10, &(0x7f00000001c0), 0x0) r7 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) close_range(r7, 0xffffffffffffffff, 0x0) 1.944601261s ago: executing program 0 (id=2596): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYRES32], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4050000030000007910380000000000be0500000000000095000000000000"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.929572943s ago: executing program 3 (id=2597): creat(0x0, 0x12e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000340)=""/160}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) setresgid(0xee00, 0x0, 0xee00) sendmsg$nl_route(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@newlink={0x68, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x84d9}, [@IFLA_LINKINFO={0x48, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x38, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e21}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e22}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_FWMARK={0x8, 0x14, 0xfffffff9}, @IFLA_IPTUN_ENCAP_TYPE={0x6}]}}}]}, 0x68}, 0x1, 0x0, 0x0, 0x6004c841}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 1.780414526s ago: executing program 1 (id=2600): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = memfd_create(&(0x7f00000001c0)='\xa3\x9fn\xb4dR\x04m5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xcc\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5\x00\x00\x00\x00\x00\x00\x00\x05L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xa7V\x88\x94\x9f\xe3\xefqi\xed\xaaw\xbe\xd0\xd0\xc8d\x96G\xcf\x066\x84\x82-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10\x04\x7f!\xca\x0e*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88\x1d\xd8F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88y\xebX\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xc5,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a', 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.717350396s ago: executing program 4 (id=2601): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000005700)={{r5, 0xffffffffffffffff}, &(0x7f0000005680), &(0x7f00000056c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='devtmpfs\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x264d, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 1.637694421s ago: executing program 1 (id=2602): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x64) r2 = io_uring_setup(0x31a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x211}) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x2000, 0x25dfdbff, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x80000000, 0x8, 0x10000000, 0x20001, 0xa}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xa}]}, {0xfffffffffffffd8e}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x4}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8800}, 0x4040000) 1.236462554s ago: executing program 0 (id=2603): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in6=@private0, @in, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@remote, 0x0, 0x32}, @in6=@empty, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {}, {0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x20}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}]}, 0x154}}, 0x0) 1.06167846s ago: executing program 0 (id=2604): mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xc0060, &(0x7f0000000000)={[{@gid}]}) 1.04552892s ago: executing program 3 (id=2605): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x27, 0x14, 0x0, &(0x7f0000000000)="f8ad1dcc02cb29dcc80032008100", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.023091087s ago: executing program 0 (id=2606): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x2) 897.459774ms ago: executing program 3 (id=2607): ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x1010, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x8, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_pressure(r3, &(0x7f0000000340)={'full', 0x20, 0x7, 0x20, 0xffff8}, 0x2f) r5 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r5, &(0x7f0000000340)={'some', 0x20, 0x7, 0x20, 0xffffa}, 0x2f) close(r5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000009c0)=@allocspi={0x12c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@private2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x33}, @in6=@mcast1, {0x5, 0x1}, {0x0, 0x4, 0x2, 0x7}, {0x0, 0x1}, 0x0, 0x0, 0xa}, 0x5, 0x5}, [@policy_type={0xa}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0xa, 0x40, 0x2e}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x1}, 0x4000080) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x1c, r1, 0x7, 0x0, 0x0, {{0x8}, {@void, @val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) 894.98226ms ago: executing program 0 (id=2608): sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x0, &(0x7f0000000300), &(0x7f0000000340)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000c40)=""/4096, 0x41000, 0x11, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000a80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0x9, 0xffffffff, 0xfdba}, 0x10, 0x22e12, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000b00)=[{0x2, 0x4, 0xa, 0x8}, {0x4, 0x2, 0xb, 0x6}, {0x4, 0x2, 0xb, 0xb}, {0x5, 0x4, 0xf, 0x5}], 0x10, 0x7fff, @void, @value}, 0x94) syslog(0x9, &(0x7f0000000380)=""/81, 0x51) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000880)=0xc) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB="496e0bd49939635c649d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x953c, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 817.476558ms ago: executing program 3 (id=2609): r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) dup(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r4, 0x800448d3, 0x0) 795.88418ms ago: executing program 4 (id=2610): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x0) fsync(r1) 737.569826ms ago: executing program 2 (id=2611): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) symlink(0x0, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 697.312335ms ago: executing program 1 (id=2612): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getrusage(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 683.320283ms ago: executing program 0 (id=2613): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000800000001000100090000000100"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000002001e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x100) getpgid(r0) getdents64(r4, &(0x7f0000000040)=""/49, 0xab) getdents64(r4, 0xfffffffffffffffe, 0x29) 601.461453ms ago: executing program 2 (id=2614): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x654a, 0x4) bind$inet(r2, &(0x7f0000000200)={0x2, 0x400, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) 565.698284ms ago: executing program 4 (id=2615): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x11, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x1f0, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(r3) 429.224009ms ago: executing program 4 (id=2616): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) r2 = openat2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000010240)={&(0x7f0000000180), 0xc, &(0x7f0000010200)={&(0x7f00000001c0)={0x10, 0x3f7, 0x0, 0x0, 0x0, {0xffff, 0x453, './file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', './file0'}}, 0x10020}}, 0x0) 321.492079ms ago: executing program 1 (id=2617): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x5607, 0x4) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, 0x0) keyctl$link(0x8, r4, r3) 267.225114ms ago: executing program 4 (id=2618): r0 = socket$nl_route(0x10, 0x3, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) openat$binderfs(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x4}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}]}}}, @IFLA_BROADCAST={0xa}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x5c}}, 0x0) 250.877065ms ago: executing program 3 (id=2619): ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x1010, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000040)='io.pressure\x00', 0x2, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r4, 0x65, 0x8, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_pressure(r3, &(0x7f0000000340)={'full', 0x20, 0x7, 0x20, 0xffff8}, 0x2f) r5 = openat$cgroup_pressure(r2, &(0x7f00000000c0)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r5, &(0x7f0000000340)={'some', 0x20, 0x7, 0x20, 0xffffa}, 0x2f) close(r5) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000009c0)=@allocspi={0x12c, 0x16, 0x1, 0x0, 0x0, {{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@private2, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@local, 0x0, 0x33}, @in6=@mcast1, {0x5, 0x1}, {0x0, 0x4, 0x2, 0x7}, {0x0, 0x1}, 0x0, 0x0, 0xa}, 0x5, 0x5}, [@policy_type={0xa}, @address_filter={0x28, 0x1a, {@in=@local, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0xa, 0x40, 0x2e}}]}, 0x12c}, 0x1, 0x0, 0x0, 0x1}, 0x4000080) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x1c, r1, 0x7, 0x0, 0x0, {{0x8}, {@void, @val={0x8, 0x3, r6}, @void}}}, 0x1c}}, 0x0) 133.518902ms ago: executing program 1 (id=2620): pipe2$9p(&(0x7f00000001c0), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) inotify_init() r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) mount$bind(0x0, 0x0, 0x0, 0x2125099, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mkdir(0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') rename(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)='./file1\x00') r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', 0x0) 133.305793ms ago: executing program 2 (id=2621): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x2200, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000015000006010040"]) 105.584058ms ago: executing program 4 (id=2622): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x64) r2 = io_uring_setup(0x31a, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x211}) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0x68, 0x30, 0x871a15abc695fa3d, 0x2000, 0x25dfdbff, {}, [{0x54, 0x1, [@m_ctinfo={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x80000000, 0x8, 0x10000000, 0x20001, 0xa}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xa}]}, {0xfffffffffffffd8e}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x4}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8800}, 0x4040000) 44.785101ms ago: executing program 1 (id=2623): clock_settime(0x0, &(0x7f0000000240)={0x77359400}) clock_adjtime(0x0, &(0x7f0000000640)={0x7, 0x9, 0x380000, 0x8, 0xfffffffffffffff9, 0xfffffffffffffff7, 0x9, 0x0, 0xae, 0x6, 0x7, 0x4, 0xfffffffffffff04f, 0x7, 0x80000000, 0xfffffffffffffff8, 0xffffffffffffffff, 0x6, 0x0, 0x100, 0x4, 0x2, 0x5, 0x3, 0x8, 0x8}) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x8) clock_adjtime(0x0, &(0x7f0000000280)={0x6, 0xe, 0xf, 0x4, 0x681, 0x8000000000000000, 0xa, 0x2, 0x9, 0x2, 0x4, 0x8000000000000000, 0xc, 0x9, 0x5, 0x9, 0x7, 0x5, 0x8, 0xfffffffffffffffa, 0x0, 0x5, 0x8, 0x7, 0x1, 0x6}) clock_gettime(0x0, 0x0) 323.182µs ago: executing program 2 (id=2624): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x80440, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="00f0000000000000eeffffffffffffff00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() getpid() getdents(0xffffffffffffffff, &(0x7f0000000300)=""/164, 0xa4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x7fe01000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r7, 0x0, 0x42, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) socketpair(0x0, 0x0, 0x0, 0x0) r9 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r9, &(0x7f0000000080)="800009e92208a1ce", 0xfdef, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 3 (id=2625): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) chroot(&(0x7f0000000000)='./file0/../file0\x00') kernel console output (not intermixed with test programs): vice [syz0] on syz1 [ 76.559480][ T30] audit: type=1400 audit(1741732660.959:514): avc: denied { block_suspend } for pid=6506 comm="syz.2.249" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 76.901810][ T30] audit: type=1400 audit(1741732661.299:515): avc: denied { connect } for pid=6525 comm="syz.4.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 76.959893][ T30] audit: type=1400 audit(1741732661.359:516): avc: denied { create } for pid=6527 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 76.987504][ T30] audit: type=1400 audit(1741732661.389:517): avc: denied { bind } for pid=6527 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 77.014492][ T30] audit: type=1400 audit(1741732661.419:518): avc: denied { connect } for pid=6527 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 77.158047][ T30] audit: type=1400 audit(1741732661.559:519): avc: denied { ioctl } for pid=6535 comm="syz.1.260" path="socket:[10420]" dev="sockfs" ino=10420 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 77.216365][ T30] audit: type=1400 audit(1741732661.559:520): avc: denied { connect } for pid=6535 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 77.268713][ T26] hid-generic 0000:0004:0000.0005: unknown main item tag 0x0 [ 77.312330][ T26] hid-generic 0000:0004:0000.0005: unknown main item tag 0x0 [ 77.319976][ T26] hid-generic 0000:0004:0000.0005: unknown main item tag 0x0 [ 77.338934][ T30] audit: type=1400 audit(1741732661.569:521): avc: denied { create } for pid=6535 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 77.368439][ T26] hid-generic 0000:0004:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz1 [ 77.415449][ T30] audit: type=1400 audit(1741732661.639:522): avc: denied { sys_admin } for pid=6535 comm="syz.1.260" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 77.585495][ T6554] netlink: 'syz.2.269': attribute type 3 has an invalid length. [ 77.620385][ T6554] netlink: 'syz.2.269': attribute type 3 has an invalid length. [ 77.675214][ T6554] netlink: 16 bytes leftover after parsing attributes in process `syz.2.269'. [ 77.693480][ T6557] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 77.700016][ T6557] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 77.711771][ T6557] vhci_hcd vhci_hcd.0: Device attached [ 77.727291][ T6562] vhci_hcd: connection closed [ 77.738306][ T2131] vhci_hcd: stop threads [ 77.756126][ T6560] tipc: Started in network mode [ 77.764057][ T6560] tipc: Node identity ac14140f, cluster identity 4711 [ 77.769814][ T2131] vhci_hcd: release socket [ 77.775295][ T2131] vhci_hcd: disconnect device [ 77.808756][ T6560] tipc: New replicast peer: 255.255.255.255 [ 77.829609][ T6566] process 'syz.2.273' launched './file0' with NULL argv: empty string added [ 77.839501][ T6560] tipc: Enabled bearer , priority 10 [ 78.019814][ T5872] hid-generic 0000:0004:0000.0006: unknown main item tag 0x0 [ 78.028564][ T5872] hid-generic 0000:0004:0000.0006: unknown main item tag 0x0 [ 78.047028][ T5872] hid-generic 0000:0004:0000.0006: unknown main item tag 0x0 [ 78.064465][ T5872] hid-generic 0000:0004:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz1 [ 78.110012][ T6578] netlink: 12 bytes leftover after parsing attributes in process `syz.3.280'. [ 78.287722][ T6588] syz.1.283 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 78.839737][ T26] tipc: Node number set to 2886997007 [ 79.703621][ T6663] sd 0:0:1:0: device reset [ 79.883394][ T6677] netlink: 'syz.0.324': attribute type 13 has an invalid length. [ 80.355766][ T6702] netlink: 136 bytes leftover after parsing attributes in process `syz.0.336'. [ 80.383305][ T6702] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 81.366393][ T6736] netlink: 28 bytes leftover after parsing attributes in process `syz.2.351'. [ 81.499630][ T30] kauditd_printk_skb: 90 callbacks suppressed [ 81.499647][ T30] audit: type=1400 audit(1741732665.899:613): avc: denied { setopt } for pid=6737 comm="syz.2.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 81.565219][ T30] audit: type=1400 audit(1741732665.909:614): avc: denied { create } for pid=6739 comm="syz.4.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 81.630871][ T30] audit: type=1400 audit(1741732665.909:615): avc: denied { setopt } for pid=6739 comm="syz.4.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 81.711477][ T30] audit: type=1400 audit(1741732666.109:616): avc: denied { read } for pid=6741 comm="syz.4.354" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 81.769823][ T30] audit: type=1400 audit(1741732666.109:617): avc: denied { open } for pid=6741 comm="syz.4.354" path="/dev/loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 81.840576][ T30] audit: type=1400 audit(1741732666.109:618): avc: denied { ioctl } for pid=6741 comm="syz.4.354" path="/dev/loop-control" dev="devtmpfs" ino=646 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 82.236756][ T30] audit: type=1400 audit(1741732666.639:619): avc: denied { map } for pid=6759 comm="syz.1.362" path="socket:[10840]" dev="sockfs" ino=10840 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 82.285459][ T30] audit: type=1400 audit(1741732666.639:620): avc: denied { read } for pid=6759 comm="syz.1.362" path="socket:[10840]" dev="sockfs" ino=10840 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 82.361691][ T30] audit: type=1400 audit(1741732666.769:621): avc: denied { create } for pid=6759 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.414622][ T30] audit: type=1400 audit(1741732666.769:622): avc: denied { ioctl } for pid=6759 comm="syz.1.362" path="socket:[10843]" dev="sockfs" ino=10843 ioctlcmd=0x48c8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 82.946879][ T6778] netlink: 52 bytes leftover after parsing attributes in process `syz.2.368'. [ 84.781126][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 86.044088][ T6841] input: syz0 as /devices/virtual/input/input6 [ 86.215332][ T6853] capability: warning: `syz.4.393' uses deprecated v2 capabilities in a way that may be insecure [ 86.536202][ T30] kauditd_printk_skb: 56 callbacks suppressed [ 86.536217][ T30] audit: type=1400 audit(1741732670.939:679): avc: denied { read } for pid=6846 comm="syz.3.392" name="usbmon7" dev="devtmpfs" ino=742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 86.583471][ T30] audit: type=1400 audit(1741732670.979:680): avc: denied { open } for pid=6846 comm="syz.3.392" path="/dev/usbmon7" dev="devtmpfs" ino=742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 86.733915][ T30] audit: type=1400 audit(1741732671.139:681): avc: denied { write } for pid=6872 comm="syz.2.402" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 86.779191][ T6875] netlink: 36 bytes leftover after parsing attributes in process `syz.4.403'. [ 86.805432][ T30] audit: type=1400 audit(1741732671.149:682): avc: denied { mount } for pid=6872 comm="syz.2.402" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 86.870731][ T30] audit: type=1400 audit(1741732671.159:683): avc: denied { search } for pid=6872 comm="syz.2.402" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 87.546136][ T30] audit: type=1400 audit(1741732671.159:684): avc: denied { read } for pid=6872 comm="syz.2.402" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 87.546169][ T30] audit: type=1400 audit(1741732671.159:685): avc: denied { open } for pid=6872 comm="syz.2.402" path="/82/file0" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 87.546198][ T30] audit: type=1400 audit(1741732671.229:686): avc: denied { unmount } for pid=5821 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 87.546223][ T30] audit: type=1400 audit(1741732671.449:687): avc: denied { read } for pid=6876 comm="syz.1.404" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 87.546249][ T30] audit: type=1400 audit(1741732671.449:688): avc: denied { open } for pid=6876 comm="syz.1.404" path="/dev/nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 88.293145][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! [ 88.491170][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 88.513327][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 88.718130][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 90.767508][ T6952] Illegal XDP return value 6952 on prog (id 232) dev N/A, expect packet loss! [ 91.194637][ T6991] kernel read not supported for file /bus (pid: 6991 comm: syz.1.446) [ 91.811682][ T30] kauditd_printk_skb: 55 callbacks suppressed [ 91.811697][ T30] audit: type=1400 audit(1741732676.209:744): avc: denied { write } for pid=7000 comm="syz.3.449" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 92.055215][ T30] audit: type=1400 audit(1741732676.299:745): avc: denied { read } for pid=7003 comm="syz.1.450" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 92.224932][ T30] audit: type=1400 audit(1741732676.299:746): avc: denied { open } for pid=7003 comm="syz.1.450" path="/dev/rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 92.248517][ C0] vkms_vblank_simulate: vblank timer overrun [ 92.491021][ T30] audit: type=1400 audit(1741732676.409:747): avc: denied { mount } for pid=7006 comm="syz.4.452" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 92.621890][ T30] audit: type=1400 audit(1741732676.569:748): avc: denied { read write } for pid=7009 comm="syz.3.453" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 92.863432][ T30] audit: type=1400 audit(1741732676.569:749): avc: denied { open } for pid=7009 comm="syz.3.453" path="/dev/input/mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 92.887503][ T30] audit: type=1400 audit(1741732676.579:750): avc: denied { unmount } for pid=5818 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 92.910663][ T30] audit: type=1400 audit(1741732676.619:751): avc: denied { mount } for pid=7011 comm="syz.1.454" name="/" dev="ramfs" ino=12334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 94.756145][ T7052] pim6reg1: entered promiscuous mode [ 94.762574][ T7052] pim6reg1: entered allmulticast mode [ 96.151437][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 96.159912][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 96.169100][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 96.177494][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 96.417466][ T7078] pim6reg1: entered promiscuous mode [ 96.422855][ T7078] pim6reg1: entered allmulticast mode [ 96.921571][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 98.643480][ T7136] wg2: entered promiscuous mode [ 98.657264][ T7136] wg2: entered allmulticast mode [ 100.030211][ T7156] wg2: entered promiscuous mode [ 100.035196][ T7156] wg2: entered allmulticast mode [ 100.236176][ T30] audit: type=1400 audit(1741732684.639:752): avc: denied { write } for pid=7163 comm="syz.2.521" name="cgroup.subtree_control" dev="cgroup2" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.321539][ T30] audit: type=1400 audit(1741732684.649:753): avc: denied { ioctl } for pid=7166 comm="syz.3.523" path="socket:[12616]" dev="sockfs" ino=12616 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 100.398029][ T30] audit: type=1400 audit(1741732684.669:754): avc: denied { open } for pid=7163 comm="syz.2.521" path="" dev="cgroup2" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.500049][ T7195] pim6reg1: entered promiscuous mode [ 101.506700][ T7195] pim6reg1: entered allmulticast mode [ 101.888996][ T30] audit: type=1400 audit(1741732686.289:755): avc: denied { setopt } for pid=7210 comm="syz.3.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 102.464934][ T7217] netlink: 'syz.1.541': attribute type 3 has an invalid length. [ 102.483180][ T30] audit: type=1400 audit(1741732686.879:756): avc: denied { ioctl } for pid=7216 comm="syz.4.542" path="/dev/iommu" dev="devtmpfs" ino=624 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 102.507739][ T7217] netlink: 4 bytes leftover after parsing attributes in process `syz.1.541'. [ 102.607033][ T30] audit: type=1400 audit(1741732686.999:757): avc: denied { ioctl } for pid=7220 comm="syz.3.543" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=12729 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 102.809134][ T30] audit: type=1400 audit(1741732687.209:758): avc: denied { create } for pid=7233 comm="syz.4.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 102.848023][ T30] audit: type=1400 audit(1741732687.239:759): avc: denied { bind } for pid=7236 comm="syz.2.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 103.135926][ T30] audit: type=1400 audit(1741732687.459:760): avc: denied { read write } for pid=7233 comm="syz.4.549" name="video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 103.487027][ T30] audit: type=1400 audit(1741732687.459:761): avc: denied { open } for pid=7233 comm="syz.4.549" path="/dev/video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 104.444348][ T7277] cgroup: No subsys list or none specified [ 105.730846][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 105.730860][ T30] audit: type=1400 audit(1741732690.119:767): avc: denied { create } for pid=7291 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 105.821257][ T30] audit: type=1400 audit(1741732690.139:768): avc: denied { bind } for pid=7291 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 106.134919][ T7320] syzkaller0: tun_chr_ioctl cmd 35108 [ 107.088784][ T30] audit: type=1400 audit(1741732691.489:769): avc: denied { bind } for pid=7338 comm="syz.1.593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 107.194945][ T7341] TCP: TCP_TX_DELAY enabled [ 107.669528][ T30] audit: type=1400 audit(1741732691.489:770): avc: denied { name_bind } for pid=7338 comm="syz.1.593" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 107.730619][ T30] audit: type=1400 audit(1741732691.489:771): avc: denied { node_bind } for pid=7338 comm="syz.1.593" saddr=10.1.1.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 107.826174][ T30] audit: type=1400 audit(1741732691.519:772): avc: denied { ioctl } for pid=7335 comm="syz.3.592" path="/dev/usbmon9" dev="devtmpfs" ino=748 ioctlcmd=0x9205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 107.851199][ C1] vkms_vblank_simulate: vblank timer overrun [ 107.968899][ T30] audit: type=1400 audit(1741732692.349:773): avc: denied { create } for pid=7348 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 108.914950][ T30] audit: type=1400 audit(1741732692.349:774): avc: denied { bind } for pid=7348 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.201445][ T30] audit: type=1400 audit(1741732692.349:775): avc: denied { listen } for pid=7348 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.430872][ T30] audit: type=1400 audit(1741732692.349:776): avc: denied { connect } for pid=7348 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.474749][ T7361] netlink: 4 bytes leftover after parsing attributes in process `syz.3.600'. [ 110.221290][ T7371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=7371 comm=syz.4.604 [ 110.235598][ T7371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=7371 comm=syz.4.604 [ 110.747058][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 110.747071][ T30] audit: type=1326 audit(1741732695.149:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 110.838795][ T30] audit: type=1326 audit(1741732695.179:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 110.865409][ T30] audit: type=1326 audit(1741732695.179:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 110.901152][ T30] audit: type=1326 audit(1741732695.199:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 110.962646][ T30] audit: type=1326 audit(1741732695.199:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.213919][ T7390] bridge1: entered promiscuous mode [ 111.224019][ T30] audit: type=1326 audit(1741732695.199:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.229397][ T7390] bridge1: entered allmulticast mode [ 111.247217][ C1] vkms_vblank_simulate: vblank timer overrun [ 111.248279][ T30] audit: type=1326 audit(1741732695.199:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.282164][ C1] vkms_vblank_simulate: vblank timer overrun [ 111.290806][ T30] audit: type=1326 audit(1741732695.199:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.295635][ T7390] team0: Port device bridge1 added [ 111.320460][ T7389] netlink: 12 bytes leftover after parsing attributes in process `syz.4.610'. [ 111.320542][ T30] audit: type=1326 audit(1741732695.209:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.480797][ T30] audit: type=1326 audit(1741732695.209:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7373 comm="syz.0.603" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74bc78d169 code=0x7ffc0000 [ 111.702311][ T7402] netlink: 12 bytes leftover after parsing attributes in process `syz.3.614'. [ 112.545222][ T7415] tmpfs: Bad value for 'usrquota_inode_hardlimit' [ 112.761332][ T7419] warning: `syz.1.622' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 113.514840][ T7431] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 117.301919][ T7469] tipc: Started in network mode [ 117.306833][ T7469] tipc: Node identity ac14140f, cluster identity 4711 [ 117.307036][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 117.307046][ T30] audit: type=1400 audit(1741732701.709:820): avc: denied { getopt } for pid=7471 comm="syz.3.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 117.351609][ T7469] tipc: New replicast peer: 255.255.255.255 [ 117.363009][ T7469] tipc: Enabled bearer , priority 10 [ 117.744473][ T30] audit: type=1326 audit(1741732702.149:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 117.820809][ T30] audit: type=1326 audit(1741732702.149:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 117.876308][ T30] audit: type=1326 audit(1741732702.149:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 117.950196][ T30] audit: type=1326 audit(1741732702.149:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.011990][ T30] audit: type=1326 audit(1741732702.149:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.077001][ T30] audit: type=1326 audit(1741732702.149:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.101807][ T30] audit: type=1326 audit(1741732702.149:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.130904][ T30] audit: type=1326 audit(1741732702.149:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.230800][ T30] audit: type=1326 audit(1741732702.149:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7495 comm="syz.1.648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5c8998d169 code=0x7ffc0000 [ 118.361762][ T78] tipc: Node number set to 2886997007 [ 118.784261][ T7551] netlink: 'syz.1.664': attribute type 1 has an invalid length. [ 118.792008][ T7551] netlink: 'syz.1.664': attribute type 4 has an invalid length. [ 118.799662][ T7551] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.664'. [ 122.543306][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 122.543321][ T30] audit: type=1400 audit(1741732706.929:855): avc: denied { create } for pid=7592 comm="syz.3.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 122.634721][ T7598] loop9: detected capacity change from 0 to 8 [ 122.706422][ T7598] Dev loop9: unable to read RDB block 8 [ 122.712712][ T30] audit: type=1400 audit(1741732706.939:856): avc: denied { setopt } for pid=7592 comm="syz.3.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 122.763187][ T7598] loop9: unable to read partition table [ 122.805497][ T7598] loop9: partition table beyond EOD, truncated [ 122.844052][ T7598] loop_reread_partitions: partition scan of loop9 (þ被x󟣑– ) failed (rc=-5) [ 122.888704][ T30] audit: type=1400 audit(1741732707.289:857): avc: denied { setopt } for pid=7601 comm="syz.3.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 122.989153][ T30] audit: type=1400 audit(1741732707.379:858): avc: denied { search } for pid=7610 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.046349][ T30] audit: type=1400 audit(1741732707.389:859): avc: denied { read } for pid=7612 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.117488][ T30] audit: type=1400 audit(1741732707.389:860): avc: denied { open } for pid=7612 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.390318][ T30] audit: type=1400 audit(1741732707.389:861): avc: denied { getattr } for pid=7612 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.452326][ T30] audit: type=1400 audit(1741732707.389:862): avc: denied { getattr } for pid=7612 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 123.566293][ T30] audit: type=1400 audit(1741732707.579:863): avc: denied { read } for pid=7615 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 123.589988][ T30] audit: type=1400 audit(1741732707.579:864): avc: denied { open } for pid=7615 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.464981][ T7737] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 127.472605][ T7737] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 127.944088][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 127.944103][ T30] audit: type=1400 audit(1741732712.349:902): avc: denied { ioctl } for pid=7740 comm="syz.3.733" path="socket:[14473]" dev="sockfs" ino=14473 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 128.155390][ T7754] netlink: 56 bytes leftover after parsing attributes in process `syz.0.736'. [ 128.191650][ T30] audit: type=1400 audit(1741732712.589:903): avc: denied { connect } for pid=7755 comm="syz.4.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.497168][ T7777] netlink: 68 bytes leftover after parsing attributes in process `syz.3.745'. [ 129.121249][ T30] audit: type=1400 audit(1741732713.519:904): avc: denied { bind } for pid=7791 comm="syz.4.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 131.880838][ T30] audit: type=1400 audit(1741732716.279:905): avc: denied { create } for pid=7816 comm="syz.3.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.211335][ T30] audit: type=1400 audit(1741732716.309:906): avc: denied { bind } for pid=7816 comm="syz.3.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.300798][ T30] audit: type=1400 audit(1741732716.319:907): avc: denied { listen } for pid=7816 comm="syz.3.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.324976][ T30] audit: type=1400 audit(1741732716.419:908): avc: denied { write } for pid=7822 comm="syz.4.754" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 132.369679][ T30] audit: type=1400 audit(1741732716.439:909): avc: denied { accept } for pid=7816 comm="syz.3.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 132.461097][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.467755][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.239493][ T30] audit: type=1400 audit(1741732717.159:910): avc: denied { mount } for pid=7838 comm="syz.1.760" name="/" dev="pstore" ino=1903 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 133.430403][ T30] audit: type=1400 audit(1741732717.829:911): avc: denied { unmount } for pid=5827 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 133.443513][ T7855] netlink: 'syz.0.761': attribute type 10 has an invalid length. [ 133.500795][ T30] audit: type=1400 audit(1741732717.829:912): avc: denied { mount } for pid=7850 comm="syz.3.763" name="/" dev="rpc_pipefs" ino=14630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:rpc_pipefs_t tclass=filesystem permissive=1 [ 133.565634][ T30] audit: type=1400 audit(1741732717.939:913): avc: denied { unmount } for pid=5829 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:rpc_pipefs_t tclass=filesystem permissive=1 [ 133.618381][ T7855] veth0_vlan: left promiscuous mode [ 133.638012][ T7855] veth0_vlan: entered promiscuous mode [ 133.656659][ T7855] team0: Device veth0_vlan failed to register rx_handler [ 133.741132][ T9] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 133.860963][ T30] audit: type=1400 audit(1741732718.159:914): avc: denied { ioctl } for pid=7860 comm="syz.1.764" path="socket:[14658]" dev="sockfs" ino=14658 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 133.896771][ T30] audit: type=1400 audit(1741732718.249:915): avc: denied { read write } for pid=7860 comm="syz.1.764" name="fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 134.441900][ T30] audit: type=1400 audit(1741732718.249:916): avc: denied { open } for pid=7860 comm="syz.1.764" path="/dev/fb0" dev="devtmpfs" ino=629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 134.465420][ T30] audit: type=1400 audit(1741732718.249:917): avc: denied { ioctl } for pid=7860 comm="syz.1.764" path="/dev/fb0" dev="devtmpfs" ino=629 ioctlcmd=0x4611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 134.520889][ T9] usb 5-1: Using ep0 maxpacket: 16 [ 134.550920][ T9] usb 5-1: New USB device found, idVendor=2137, idProduct=0001, bcdDevice=2a.35 [ 134.570198][ T9] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 134.587673][ T30] audit: type=1400 audit(1741732718.979:918): avc: denied { write } for pid=7870 comm="syz.1.767" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 134.786325][ T9] usb 5-1: Product: syz [ 134.843004][ T9] usb 5-1: Manufacturer: syz [ 134.850972][ T7874] kvm: emulating exchange as write [ 134.869835][ T7855] syz.0.761 (7855) used greatest stack depth: 20784 bytes left [ 134.890055][ T9] usb 5-1: SerialNumber: syz [ 134.955630][ T30] audit: type=1400 audit(1741732719.199:919): avc: denied { write } for pid=5178 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 135.083616][ T9] usb 5-1: config 0 descriptor?? [ 135.093049][ T7877] bridge_slave_0: left allmulticast mode [ 135.098717][ T7877] bridge_slave_0: left promiscuous mode [ 135.132743][ T9] as10x_usb: device has been detected [ 135.139174][ T9] dvbdev: DVB: registering new adapter (Sky IT Digital Key (green led)) [ 135.154978][ T7877] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.209747][ T9] usb 5-1: DVB: registering adapter 1 frontend 0 (Sky IT Digital Key (green led))... [ 135.233123][ T7877] bridge_slave_1: left allmulticast mode [ 135.252381][ T7877] bridge_slave_1: left promiscuous mode [ 135.269065][ T7877] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.284244][ T9] as10x_usb: error during firmware upload part1 [ 135.291710][ T9] Registered device Sky IT Digital Key (green led) [ 135.323741][ T7847] random: crng reseeded on system resumption [ 135.351739][ T7877] bond0: (slave bond_slave_0): Releasing backup interface [ 135.378205][ T7877] bond0: (slave bond_slave_1): Releasing backup interface [ 135.399769][ T7877] team0: Port device team_slave_0 removed [ 135.411431][ T7877] team0: Port device team_slave_1 removed [ 135.418487][ T7877] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 135.426188][ T7877] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 135.434719][ T7877] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 135.442983][ T7877] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 135.995544][ T78] usb 5-1: USB disconnect, device number 2 [ 136.038206][ T78] Unregistered device Sky IT Digital Key (green led) [ 136.045082][ T78] as10x_usb: device has been disconnected [ 136.210998][ T26] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 136.370894][ T26] usb 4-1: Using ep0 maxpacket: 32 [ 136.380075][ T26] usb 4-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 136.393123][ T26] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 136.416297][ T26] usb 4-1: config 0 descriptor?? [ 136.430299][ T26] gspca_main: vc032x-2.14.0 probing 0ac8:0321 [ 137.404192][ T7930] netlink: 24 bytes leftover after parsing attributes in process `syz.2.789'. [ 138.683283][ T9] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 138.756592][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 138.756607][ T30] audit: type=1400 audit(1741732723.159:955): avc: denied { write } for pid=7956 comm="syz.2.799" name="nvram" dev="devtmpfs" ino=623 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 139.711882][ T9] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 139.723689][ T9] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 139.727987][ T26] gspca_vc032x: reg_r err -110 [ 139.734445][ T9] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 139.739223][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.748324][ T9] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 139.762738][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.769803][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.780121][ T7949] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 139.785564][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.793109][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.798392][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.800411][ T9] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 139.805824][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.822029][ T5871] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 139.832630][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.848056][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.968207][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.976916][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.982545][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.988010][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.993408][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 139.998715][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 140.004249][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 140.009600][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 140.554151][ T26] gspca_vc032x: I2c Bus Busy Wait 00 [ 140.569631][ T26] gspca_vc032x: Unknown sensor... [ 140.587131][ T26] vc032x 4-1:0.0: probe with driver vc032x failed with error -22 [ 140.630822][ T5871] usb 5-1: Using ep0 maxpacket: 8 [ 140.638038][ T5871] usb 5-1: config index 0 descriptor too short (expected 301, got 45) [ 140.646928][ T5871] usb 5-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 140.771527][ T78] usb 4-1: USB disconnect, device number 2 [ 140.850466][ T5871] usb 5-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 141.103781][ T30] audit: type=1400 audit(1741732725.479:956): avc: denied { getopt } for pid=7948 comm="syz.1.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 141.370156][ T5871] usb 5-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 141.389836][ T5871] usb 5-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 141.403227][ T5871] usb 5-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 141.412487][ T5871] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 141.572083][ T5828] Bluetooth: hci2: Controller not accepting commands anymore: ncmd = 0 [ 141.581051][ T5828] Bluetooth: hci2: Injecting HCI hardware error event [ 141.589341][ T5828] Bluetooth: hci2: hardware error 0x00 [ 141.648468][ T5871] usb 5-1: GET_CAPABILITIES returned 0 [ 141.676895][ T5871] usbtmc 5-1:16.0: can't read capabilities [ 142.031524][ T5871] usb 5-1: USB disconnect, device number 3 [ 142.430047][ T30] audit: type=1400 audit(1741732726.829:957): avc: denied { setopt } for pid=7993 comm="syz.2.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 142.501847][ T5871] usb 2-1: USB disconnect, device number 2 [ 142.580843][ T5873] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 143.731281][ T5828] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 144.161978][ T5873] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 144.186386][ T5873] usb 1-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 144.242799][ T5873] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 144.257675][ T5873] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 144.270662][ T7991] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 144.375297][ T30] audit: type=1400 audit(1741732728.779:958): avc: denied { bind } for pid=8009 comm="syz.4.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 144.856552][ T5873] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 146.650935][ T5873] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 146.800926][ T5873] usb 3-1: Using ep0 maxpacket: 32 [ 146.815701][ T5873] usb 3-1: config index 0 descriptor too short (expected 156, got 27) [ 146.826257][ T5873] usb 3-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 146.838504][ T5873] usb 3-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 146.855375][ T5873] usb 3-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 146.895332][ T5873] usb 3-1: config 0 interface 0 has no altsetting 0 [ 146.969957][ T8034] pimreg: entered allmulticast mode [ 147.036358][ T5873] usb 3-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 147.114604][ T5873] usb 3-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 147.360828][ T5873] usb 3-1: Product: syz [ 147.367843][ T5873] usb 3-1: Manufacturer: syz [ 147.376767][ T5873] usb 3-1: SerialNumber: syz [ 147.389055][ T5873] usb 3-1: config 0 descriptor?? [ 147.397728][ T5873] ldusb 3-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 147.404015][ T9] usb 1-1: USB disconnect, device number 2 [ 148.029767][ T30] audit: type=1400 audit(1741732732.429:959): avc: denied { getopt } for pid=8039 comm="syz.0.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 148.122699][ T5873] ldusb 3-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 148.157785][ T5873] usb 3-1: USB disconnect, device number 2 [ 148.198164][ T5873] ldusb 3-1:0.0: LD USB Device #0 now disconnected [ 148.349888][ T8054] cgroup: Unknown subsys name '¬§@﬽æì¦4*oäÂÒ£hÓîºoþüíUÜ' [ 148.420947][ T30] audit: type=1400 audit(1741732732.809:960): avc: denied { map } for pid=8050 comm="syz.3.830" path="pipe:[15377]" dev="pipefs" ino=15377 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 148.451546][ T9] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 149.457246][ T8066] ubi31: attaching mtd0 [ 149.465885][ T8066] ubi31: scanning is finished [ 149.470638][ T8066] ubi31: empty MTD device detected [ 150.252058][ T8070] libceph: resolve 'c' (ret=-3): failed [ 150.434108][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 150.463768][ T9] usb 1-1: New USB device found, idVendor=2137, idProduct=0001, bcdDevice=2a.35 [ 150.473570][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 150.481654][ T9] usb 1-1: Product: syz [ 150.490773][ T9] usb 1-1: Manufacturer: syz [ 150.495406][ T9] usb 1-1: SerialNumber: syz [ 150.770660][ T9] usb 1-1: config 0 descriptor?? [ 150.791841][ T9] as10x_usb: device has been detected [ 150.797547][ T9] dvbdev: DVB: registering new adapter (Sky IT Digital Key (green led)) [ 150.882150][ T9] usb 1-1: DVB: registering adapter 1 frontend 0 (Sky IT Digital Key (green led))... [ 150.931697][ T9] as10x_usb: error during firmware upload part1 [ 150.972061][ T9] Registered device Sky IT Digital Key (green led) [ 150.999582][ T8040] random: crng reseeded on system resumption [ 151.212596][ T8066] ubi31 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt31d", error -4 [ 152.023198][ T8090] x_tables: duplicate underflow at hook 2 [ 152.252082][ T30] audit: type=1400 audit(1741732736.649:961): avc: denied { bind } for pid=8093 comm="syz.4.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 152.332079][ T9] usb 1-1: USB disconnect, device number 3 [ 152.346803][ T9] Unregistered device Sky IT Digital Key (green led) [ 152.352536][ T9] as10x_usb: device has been disconnected [ 153.113786][ T8103] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 [ 153.373767][ T8109] tipc: New replicast peer: fe80:0000:0000:0000:0000:0000:0000:00bb [ 153.382749][ T8109] tipc: Enabled bearer , priority 10 [ 154.000169][ T8114] tipc: Enabling of bearer rejected, already enabled [ 155.063218][ T30] audit: type=1400 audit(1741732738.999:962): avc: denied { shutdown } for pid=8119 comm="syz.1.852" lport=45896 faddr=fc01:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.854072][ T30] audit: type=1400 audit(1741732741.259:963): avc: denied { listen } for pid=8145 comm="syz.3.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 156.930794][ T30] audit: type=1400 audit(1741732741.329:964): avc: denied { create } for pid=8145 comm="syz.3.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 159.113944][ T8190] x_tables: unsorted underflow at hook 3 [ 160.483139][ T8197] netlink: 12 bytes leftover after parsing attributes in process `syz.0.875'. [ 161.011778][ T30] audit: type=1400 audit(1741732745.409:965): avc: denied { write } for pid=8186 comm="syz.1.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 161.246677][ T30] audit: type=1400 audit(1741732745.649:966): avc: denied { create } for pid=8214 comm="syz.1.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 162.099701][ T30] audit: type=1400 audit(1741732746.499:967): avc: denied { connect } for pid=8214 comm="syz.1.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 162.153106][ T30] audit: type=1400 audit(1741732746.499:968): avc: denied { write } for pid=8214 comm="syz.1.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 162.174088][ T30] audit: type=1400 audit(1741732746.579:969): avc: denied { read } for pid=8214 comm="syz.1.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 162.210878][ T30] audit: type=1404 audit(1741732746.609:970): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 162.242216][ T30] audit: type=1400 audit(1741732746.649:971): avc: denied { ioctl } for pid=8219 comm="syz.3.882" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 162.279484][ T30] audit: type=1400 audit(1741732746.679:972): avc: denied { mounton } for pid=8214 comm="syz.1.881" path="/178/file0" dev="tmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 162.302037][ T30] audit: type=1400 audit(1741732746.679:973): avc: denied { prog_load } for pid=8228 comm="syz.2.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 162.321145][ T30] audit: type=1400 audit(1741732746.679:974): avc: denied { execmem } for pid=8228 comm="syz.2.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 166.038625][ T30] kauditd_printk_skb: 196 callbacks suppressed [ 166.038639][ T30] audit: type=1400 audit(1741732750.439:1171): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.261810][ T30] audit: type=1400 audit(1741732750.509:1172): avc: denied { create } for pid=8344 comm="syz.2.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 166.308188][ T30] audit: type=1400 audit(1741732750.599:1173): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.359007][ T30] audit: type=1400 audit(1741732750.659:1174): avc: denied { execmem } for pid=8346 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 166.400988][ T30] audit: type=1400 audit(1741732750.659:1175): avc: denied { map_create } for pid=8346 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.440762][ T30] audit: type=1400 audit(1741732750.659:1176): avc: denied { prog_load } for pid=8346 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.500876][ T30] audit: type=1400 audit(1741732750.659:1177): avc: denied { prog_load } for pid=8346 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 166.550311][ T30] audit: type=1400 audit(1741732750.659:1178): avc: denied { create } for pid=8346 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 166.588230][ T30] audit: type=1400 audit(1741732750.809:1179): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 166.689952][ T30] audit: type=1400 audit(1741732750.869:1180): avc: denied { create } for pid=8353 comm="syz.2.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 171.070857][ T30] kauditd_printk_skb: 195 callbacks suppressed [ 171.070874][ T30] audit: type=1400 audit(1741732755.469:1376): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.126059][ T30] audit: type=1400 audit(1741732755.529:1377): avc: denied { map_create } for pid=8433 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.149349][ T30] audit: type=1400 audit(1741732755.549:1378): avc: denied { map_create } for pid=8433 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.169651][ T30] audit: type=1400 audit(1741732755.549:1379): avc: denied { prog_load } for pid=8433 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.188925][ T30] audit: type=1400 audit(1741732755.549:1380): avc: denied { prog_load } for pid=8433 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.414035][ T30] audit: type=1400 audit(1741732755.589:1381): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 171.459277][ T30] audit: type=1400 audit(1741732755.649:1382): avc: denied { prog_load } for pid=8432 comm="syz.3.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.500001][ T30] audit: type=1400 audit(1741732755.649:1383): avc: denied { prog_load } for pid=8432 comm="syz.3.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.536192][ T30] audit: type=1400 audit(1741732755.649:1384): avc: denied { map_create } for pid=8432 comm="syz.3.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.561545][ T30] audit: type=1400 audit(1741732755.649:1385): avc: denied { prog_load } for pid=8432 comm="syz.3.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 172.748365][ T8466] 8021q: VLANs not supported on ip6tnl0 [ 176.119410][ T30] kauditd_printk_skb: 213 callbacks suppressed [ 176.119426][ T30] audit: type=1400 audit(1741732760.519:1599): avc: denied { prog_load } for pid=8569 comm="syz.0.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.153519][ T30] audit: type=1400 audit(1741732760.549:1600): avc: denied { create } for pid=8567 comm="syz.3.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 176.175180][ T30] audit: type=1400 audit(1741732760.549:1601): avc: denied { create } for pid=8567 comm="syz.3.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 176.229106][ T30] audit: type=1400 audit(1741732760.549:1602): avc: denied { map_create } for pid=8567 comm="syz.3.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.248714][ T30] audit: type=1400 audit(1741732760.549:1603): avc: denied { map_create } for pid=8567 comm="syz.3.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.268294][ T30] audit: type=1400 audit(1741732760.549:1604): avc: denied { prog_load } for pid=8567 comm="syz.3.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.289078][ T30] audit: type=1400 audit(1741732760.559:1605): avc: denied { map_create } for pid=8569 comm="syz.0.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.364463][ T30] audit: type=1400 audit(1741732760.559:1606): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.399861][ T30] audit: type=1400 audit(1741732760.579:1607): avc: denied { prog_load } for pid=8569 comm="syz.0.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.419136][ T30] audit: type=1400 audit(1741732760.599:1608): avc: denied { prog_load } for pid=8569 comm="syz.0.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.650224][ T8702] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:0000 with DS=0xf [ 180.613011][ T5144] Bluetooth: hci4: command 0x0406 tx timeout [ 180.619077][ T5838] Bluetooth: hci0: command 0x0406 tx timeout [ 180.619095][ T5835] Bluetooth: hci1: command 0x0406 tx timeout [ 180.625354][ T5838] Bluetooth: hci3: command 0x0406 tx timeout [ 181.188078][ T30] kauditd_printk_skb: 402 callbacks suppressed [ 181.188093][ T30] audit: type=1400 audit(1741732765.589:2011): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 181.268621][ T30] audit: type=1400 audit(1741732765.669:2012): avc: denied { map_create } for pid=8781 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.528526][ T30] audit: type=1400 audit(1741732765.669:2013): avc: denied { prog_load } for pid=8781 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.588391][ T30] audit: type=1400 audit(1741732765.689:2014): avc: denied { map_create } for pid=8781 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.636038][ T30] audit: type=1400 audit(1741732765.689:2015): avc: denied { prog_load } for pid=8781 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.779849][ T30] audit: type=1400 audit(1741732766.179:2016): avc: denied { map_create } for pid=8784 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.838299][ T30] audit: type=1400 audit(1741732766.209:2017): avc: denied { prog_load } for pid=8784 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.914001][ T30] audit: type=1400 audit(1741732766.209:2018): avc: denied { prog_load } for pid=8784 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 181.974830][ T30] audit: type=1400 audit(1741732766.209:2019): avc: denied { prog_load } for pid=8784 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 182.061043][ T30] audit: type=1400 audit(1741732766.209:2020): avc: denied { create } for pid=8784 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 186.226705][ T30] kauditd_printk_skb: 229 callbacks suppressed [ 186.226719][ T30] audit: type=1400 audit(1741732770.629:2250): avc: denied { map_create } for pid=8891 comm="syz.2.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.288549][ T30] audit: type=1400 audit(1741732770.629:2251): avc: denied { prog_load } for pid=8891 comm="syz.2.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.358663][ T30] audit: type=1400 audit(1741732770.629:2252): avc: denied { prog_load } for pid=8891 comm="syz.2.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.414391][ T30] audit: type=1400 audit(1741732770.629:2253): avc: denied { prog_load } for pid=8891 comm="syz.2.1158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.468191][ T30] audit: type=1400 audit(1741732770.629:2254): avc: denied { read } for pid=8891 comm="syz.2.1158" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 186.503880][ T30] audit: type=1400 audit(1741732770.659:2255): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 186.597354][ T30] audit: type=1400 audit(1741732770.659:2256): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 186.682036][ T30] audit: type=1400 audit(1741732770.719:2257): avc: denied { create } for pid=8893 comm="syz.4.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 186.860056][ T30] audit: type=1400 audit(1741732770.719:2258): avc: denied { map_create } for pid=8893 comm="syz.4.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.918932][ T30] audit: type=1400 audit(1741732770.739:2259): avc: denied { prog_load } for pid=8894 comm="syz.2.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.230882][ T30] kauditd_printk_skb: 288 callbacks suppressed [ 191.230899][ T30] audit: type=1400 audit(1741732775.629:2548): avc: denied { execmem } for pid=9011 comm="syz.3.1209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.599022][ T30] audit: type=1400 audit(1741732775.689:2549): avc: denied { create } for pid=9014 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 191.665067][ T30] audit: type=1400 audit(1741732775.729:2550): avc: denied { prog_load } for pid=9014 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.729994][ T30] audit: type=1400 audit(1741732775.739:2551): avc: denied { execmem } for pid=9014 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.817057][ T30] audit: type=1400 audit(1741732775.739:2552): avc: denied { create } for pid=9011 comm="syz.3.1209" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 192.030836][ T30] audit: type=1400 audit(1741732775.889:2553): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 192.135407][ T30] audit: type=1400 audit(1741732775.939:2554): avc: denied { create } for pid=9014 comm="syz.2.1210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 192.212197][ T30] audit: type=1400 audit(1741732776.039:2555): avc: denied { map_create } for pid=9019 comm="syz.4.1212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 192.276605][ T30] audit: type=1400 audit(1741732776.049:2556): avc: denied { prog_load } for pid=9019 comm="syz.4.1212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 192.330813][ T30] audit: type=1400 audit(1741732776.049:2557): avc: denied { prog_load } for pid=9019 comm="syz.4.1212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 193.505451][ T9052] wg2: entered promiscuous mode [ 193.510408][ T9052] wg2: entered allmulticast mode [ 193.542041][ T53] Bluetooth: hci5: sending frame failed (-49) [ 193.548947][ T5833] Bluetooth: hci5: Opcode 0x1003 failed: -49 [ 193.895047][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.902592][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 196.263709][ T30] kauditd_printk_skb: 190 callbacks suppressed [ 196.263724][ T30] audit: type=1400 audit(1741732780.669:2748): avc: denied { name_bind } for pid=9132 comm="syz.0.1258" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 196.326762][ T30] audit: type=1400 audit(1741732780.719:2749): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.437027][ T30] audit: type=1400 audit(1741732780.839:2750): avc: denied { map_create } for pid=9136 comm="syz.0.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.675880][ T30] audit: type=1400 audit(1741732780.859:2751): avc: denied { prog_load } for pid=9136 comm="syz.0.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.695075][ T30] audit: type=1400 audit(1741732780.859:2752): avc: denied { prog_load } for pid=9136 comm="syz.0.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.714228][ T30] audit: type=1400 audit(1741732780.859:2753): avc: denied { prog_load } for pid=9136 comm="syz.0.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.733470][ T30] audit: type=1400 audit(1741732780.859:2754): avc: denied { mounton } for pid=9136 comm="syz.0.1260" path="/245/file0" dev="tmpfs" ino=1272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 196.757100][ T30] audit: type=1400 audit(1741732780.919:2755): avc: denied { create } for pid=9134 comm="syz.2.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 196.777623][ T30] audit: type=1400 audit(1741732780.989:2756): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.801928][ T30] audit: type=1400 audit(1741732781.099:2757): avc: denied { prog_load } for pid=9139 comm="syz.0.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.288116][ T30] kauditd_printk_skb: 194 callbacks suppressed [ 201.288131][ T30] audit: type=1400 audit(1741733014.684:2952): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.347469][ T30] audit: type=1400 audit(1741733014.744:2953): avc: denied { read } for pid=9226 comm="syz.3.1297" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 201.420898][ T30] audit: type=1400 audit(1741733014.814:2954): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 201.474858][ T30] audit: type=1400 audit(1741733014.874:2955): avc: denied { execmem } for pid=9228 comm="syz.3.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 201.526458][ T30] audit: type=1400 audit(1741733014.924:2956): avc: denied { map_create } for pid=9228 comm="syz.3.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.551168][ T30] audit: type=1400 audit(1741733014.944:2957): avc: denied { prog_load } for pid=9228 comm="syz.3.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.580784][ T30] audit: type=1400 audit(1741733014.944:2958): avc: denied { prog_load } for pid=9228 comm="syz.3.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.701298][ T30] audit: type=1400 audit(1741733015.104:2959): avc: denied { prog_load } for pid=9231 comm="syz.0.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.733030][ T30] audit: type=1400 audit(1741733015.124:2960): avc: denied { create } for pid=9231 comm="syz.0.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 201.865960][ T30] audit: type=1400 audit(1741733015.264:2961): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 205.373835][ T9343] serio: Serial port ptm0 [ 206.519767][ T30] kauditd_printk_skb: 344 callbacks suppressed [ 206.519783][ T30] audit: type=1400 audit(1741733019.914:3306): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.576297][ T30] audit: type=1400 audit(1741733019.974:3307): avc: denied { read } for pid=9379 comm="syz.2.1363" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 206.609261][ T30] audit: type=1400 audit(1741733019.974:3308): avc: denied { prog_load } for pid=9379 comm="syz.2.1363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.633068][ T30] audit: type=1400 audit(1741733020.004:3309): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.668491][ T30] audit: type=1400 audit(1741733020.034:3310): avc: denied { execmem } for pid=9381 comm="syz.2.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 206.711683][ T30] audit: type=1400 audit(1741733020.114:3311): avc: denied { map_create } for pid=9381 comm="syz.2.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.732234][ T30] audit: type=1400 audit(1741733020.114:3312): avc: denied { prog_load } for pid=9381 comm="syz.2.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.787898][ T30] audit: type=1400 audit(1741733020.114:3313): avc: denied { prog_load } for pid=9381 comm="syz.2.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.838194][ T30] audit: type=1400 audit(1741733020.114:3314): avc: denied { prog_load } for pid=9381 comm="syz.2.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.885365][ T30] audit: type=1400 audit(1741733020.114:3315): avc: denied { read write } for pid=9381 comm="syz.2.1364" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 211.535141][ T30] kauditd_printk_skb: 220 callbacks suppressed [ 211.535157][ T30] audit: type=1400 audit(1741733024.934:3536): avc: denied { create } for pid=9482 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 211.610571][ T30] audit: type=1400 audit(1741733024.934:3537): avc: denied { bpf } for pid=9482 comm="syz.4.1403" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 211.653948][ T30] audit: type=1400 audit(1741733024.934:3538): avc: denied { map_create } for pid=9482 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.709406][ T30] audit: type=1400 audit(1741733024.934:3539): avc: denied { create } for pid=9482 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 211.785729][ T30] audit: type=1400 audit(1741733024.934:3540): avc: denied { execmem } for pid=9482 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 211.836212][ T30] audit: type=1400 audit(1741733024.934:3541): avc: denied { create } for pid=9482 comm="syz.4.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 211.870775][ T30] audit: type=1400 audit(1741733024.974:3542): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 211.894917][ C0] vkms_vblank_simulate: vblank timer overrun [ 211.930770][ T30] audit: type=1400 audit(1741733025.034:3543): avc: denied { map_create } for pid=9484 comm="syz.4.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.970235][ T30] audit: type=1400 audit(1741733025.044:3544): avc: denied { prog_load } for pid=9484 comm="syz.4.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 211.995201][ T30] audit: type=1400 audit(1741733025.274:3545): avc: denied { read write } for pid=9490 comm="syz.0.1405" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 214.514476][ T9562] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 215.032065][ T9571] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 215.062016][ T9571] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 216.309102][ T9607] xt_bpf: check failed: parse error [ 216.542134][ T30] kauditd_printk_skb: 268 callbacks suppressed [ 216.542149][ T30] audit: type=1400 audit(1741733029.944:3814): avc: denied { map_create } for pid=9614 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.616009][ T30] audit: type=1400 audit(1741733029.944:3815): avc: denied { prog_load } for pid=9617 comm="syz.1.1457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.654096][ T30] audit: type=1400 audit(1741733029.944:3816): avc: denied { write } for pid=9617 comm="syz.1.1457" name="001" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 216.676914][ C0] vkms_vblank_simulate: vblank timer overrun [ 216.691190][ T30] audit: type=1400 audit(1741733029.974:3817): avc: denied { create } for pid=9614 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 216.710827][ T30] audit: type=1400 audit(1741733029.974:3818): avc: denied { prog_load } for pid=9614 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.730422][ T30] audit: type=1400 audit(1741733029.974:3819): avc: denied { prog_load } for pid=9614 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.749555][ T30] audit: type=1400 audit(1741733029.974:3820): avc: denied { prog_load } for pid=9614 comm="syz.2.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.768770][ T30] audit: type=1400 audit(1741733030.014:3821): avc: denied { execmem } for pid=9621 comm="syz.3.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 216.790022][ T30] audit: type=1400 audit(1741733030.084:3822): avc: denied { map_create } for pid=9621 comm="syz.3.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.809115][ C0] vkms_vblank_simulate: vblank timer overrun [ 216.815388][ T30] audit: type=1400 audit(1741733030.084:3823): avc: denied { prog_load } for pid=9621 comm="syz.3.1459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Mar 11 22:43:50 syzkaller daemon.err dhcpcd[9633]: ps_bpf_start_bpf: bpf_open: Invalid argument Mar 11 22:43:50 syzkaller daemon.err dhcpcd[9633]: ps_root_recvmsg: Invalid argument Mar 11 22:43:50 syzkaller daemon.err dhcpcd[5490]: ps_sendpsmmsg: Connection refused Mar 11 22:43:50 syzkaller daemon.err dhcpcd[5490]: ps_root_recvmsgcb: failed to send message to pid 8110: Connection refused Mar 11 22:43:51 syzkaller daemon.err dhcpcd[9640]: ps_bpf_start_bpf: bpf_open: Invalid argument Mar 11 22:43:51 syzkaller daemon.err dhcpcd[9640]: ps_root_recvmsg: Invalid argument [ 218.855769][ T9694] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 218.864782][ T9694] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 Mar 11 22:43:52 syzkaller daemon.err dhcpcd[9695]: ps_bpf_start_[ 218.898094][ T9685] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' bpf: bpf_open: Invalid argument Mar 11 22:43:52 syzkaller daemon.err dhcpcd[9695]: ps_root_recvmsg: Invalid argument Mar 11 22:43:52 syzkaller daemon.err dhcpcd[9705]: ps_bpf_start_bpf: bpf_open: Invalid argument Mar 11 22:43:52 syzkaller daemon.err dhcpcd[9705]: ps_root_recvmsg: Invalid argument [ 219.448016][ T9713] xt_bpf: check failed: parse error [ 219.815744][ T9732] syzkaller0: entered allmulticast mode [ 220.624304][ T9757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1898 sclass=netlink_route_socket pid=9757 comm=syz.4.1513 [ 221.554350][ T30] kauditd_printk_skb: 378 callbacks suppressed [ 221.554366][ T30] audit: type=1400 audit(1741733034.954:4202): avc: denied { create } for pid=9780 comm="syz.4.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 221.569469][ T9786] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 221.612333][ T30] audit: type=1400 audit(1741733035.014:4203): avc: denied { prog_load } for pid=9787 comm="syz.0.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.654721][ T30] audit: type=1400 audit(1741733035.034:4204): avc: denied { execmem } for pid=9787 comm="syz.0.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 221.757608][ T30] audit: type=1400 audit(1741733035.034:4205): avc: denied { prog_load } for pid=9787 comm="syz.0.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.815800][ T30] audit: type=1400 audit(1741733035.074:4206): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 221.867156][ T30] audit: type=1400 audit(1741733035.084:4207): avc: denied { map_create } for pid=9780 comm="syz.4.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.893855][ T30] audit: type=1400 audit(1741733035.114:4208): avc: denied { prog_load } for pid=9780 comm="syz.4.1527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.960963][ T30] audit: type=1400 audit(1741733035.124:4209): avc: denied { prog_load } for pid=9792 comm="syz.3.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.056927][ T9811] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 222.080779][ T30] audit: type=1400 audit(1741733035.124:4210): avc: denied { prog_load } for pid=9792 comm="syz.3.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 222.226568][ T30] audit: type=1400 audit(1741733035.144:4211): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.565912][ T30] kauditd_printk_skb: 423 callbacks suppressed [ 226.565926][ T30] audit: type=1400 audit(1741733039.964:4635): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.656661][ T30] audit: type=1400 audit(1741733040.044:4636): avc: denied { read } for pid=9951 comm="syz.2.1598" dev="nsfs" ino=4026532856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 226.713418][ T30] audit: type=1400 audit(1741733040.094:4637): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.778920][ T30] audit: type=1400 audit(1741733040.164:4638): avc: denied { map_create } for pid=9953 comm="syz.2.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.828655][ T30] audit: type=1400 audit(1741733040.164:4639): avc: denied { prog_load } for pid=9953 comm="syz.2.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.889047][ T30] audit: type=1400 audit(1741733040.164:4640): avc: denied { create } for pid=9953 comm="syz.2.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 226.934078][ T30] audit: type=1400 audit(1741733040.214:4641): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.987896][ T30] audit: type=1400 audit(1741733040.264:4642): avc: denied { map_create } for pid=9955 comm="syz.2.1600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.044124][ T30] audit: type=1400 audit(1741733040.274:4643): avc: denied { prog_load } for pid=9955 comm="syz.2.1600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.094268][ T30] audit: type=1400 audit(1741733040.274:4644): avc: denied { prog_load } for pid=9955 comm="syz.2.1600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.498776][T10030] syzkaller0: entered promiscuous mode [ 230.530256][T10030] syzkaller0: entered allmulticast mode [ 231.643652][ T30] kauditd_printk_skb: 159 callbacks suppressed [ 231.643667][ T30] audit: type=1400 audit(1741733045.044:4804): avc: denied { map_create } for pid=10050 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.718621][ T30] audit: type=1400 audit(1741733045.074:4805): avc: denied { execmem } for pid=10051 comm="syz.0.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 231.777689][ T30] audit: type=1400 audit(1741733045.074:4806): avc: denied { create } for pid=10051 comm="syz.0.1640" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 231.799304][ T30] audit: type=1400 audit(1741733045.074:4807): avc: denied { prog_load } for pid=10050 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.831307][ T30] audit: type=1400 audit(1741733045.074:4808): avc: denied { prog_load } for pid=10050 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.857925][ T30] audit: type=1400 audit(1741733045.074:4809): avc: denied { prog_load } for pid=10050 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.879015][ T30] audit: type=1400 audit(1741733045.164:4810): avc: denied { prog_load } for pid=10055 comm="syz.0.1641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.898513][ T30] audit: type=1400 audit(1741733045.224:4811): avc: denied { execmem } for pid=10055 comm="syz.0.1641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 231.934696][ T30] audit: type=1400 audit(1741733045.324:4812): avc: denied { map_create } for pid=10055 comm="syz.0.1641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 232.030864][ T30] audit: type=1400 audit(1741733045.334:4813): avc: denied { prog_load } for pid=10055 comm="syz.0.1641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 236.704986][ T30] kauditd_printk_skb: 134 callbacks suppressed [ 236.705001][ T30] audit: type=1400 audit(1741733050.104:4948): avc: denied { map_create } for pid=10154 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 236.730542][ C1] vkms_vblank_simulate: vblank timer overrun [ 236.910747][ T30] audit: type=1400 audit(1741733050.294:4949): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 236.934907][ C1] vkms_vblank_simulate: vblank timer overrun [ 237.040488][ T30] audit: type=1400 audit(1741733050.414:4950): avc: denied { prog_load } for pid=10154 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.135213][ T30] audit: type=1400 audit(1741733050.414:4951): avc: denied { map_create } for pid=10154 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.191843][ T30] audit: type=1400 audit(1741733050.414:4952): avc: denied { create } for pid=10154 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 237.212518][ C1] vkms_vblank_simulate: vblank timer overrun [ 237.271957][ T30] audit: type=1400 audit(1741733050.414:4953): avc: denied { prog_load } for pid=10154 comm="syz.1.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 237.316853][ T30] audit: type=1400 audit(1741733050.494:4954): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 237.396406][ T30] audit: type=1400 audit(1741733050.594:4955): avc: denied { create } for pid=10160 comm="syz.2.1680" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 237.470766][ T30] audit: type=1400 audit(1741733050.604:4956): avc: denied { create } for pid=10160 comm="syz.2.1680" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 237.540795][ T30] audit: type=1400 audit(1741733050.634:4957): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 237.564990][ C1] vkms_vblank_simulate: vblank timer overrun [ 238.297317][T10198] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 239.563638][T10229] SELinux: security_context_str_to_sid (defcontext) failed with errno=-22 [ 241.261689][T10296] x_tables: unsorted underflow at hook 3 [ 241.803006][ T30] kauditd_printk_skb: 237 callbacks suppressed [ 241.803021][ T30] audit: type=1400 audit(1741733056.207:5195): avc: denied { prog_load } for pid=10304 comm="syz.0.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 241.870517][ T30] audit: type=1400 audit(1741733056.247:5196): avc: denied { prog_load } for pid=10304 comm="syz.0.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 241.950152][ T30] audit: type=1400 audit(1741733056.347:5197): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.155502][ T30] audit: type=1400 audit(1741733056.557:5198): avc: denied { bpf } for pid=10308 comm="syz.3.1740" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 242.183227][ T30] audit: type=1400 audit(1741733056.557:5199): avc: denied { prog_load } for pid=10308 comm="syz.3.1740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.207517][ T30] audit: type=1400 audit(1741733056.557:5200): avc: denied { read } for pid=10308 comm="syz.3.1740" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 242.260745][ T30] audit: type=1400 audit(1741733056.657:5201): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.337915][ T30] audit: type=1400 audit(1741733056.717:5202): avc: denied { mounton } for pid=10310 comm="syz.3.1741" path="/352" dev="tmpfs" ino=1821 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 242.445520][ T30] audit: type=1400 audit(1741733056.847:5203): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 242.500633][ T30] audit: type=1400 audit(1741733056.897:5204): avc: denied { prog_load } for pid=10312 comm="syz.1.1742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 242.649841][T10311] Â: renamed from pim6reg1 [ 245.483336][T10410] x_tables: unsorted underflow at hook 3 [ 246.832173][ T30] kauditd_printk_skb: 226 callbacks suppressed [ 246.832188][ T30] audit: type=1400 audit(1741733061.237:5431): avc: denied { map_create } for pid=10452 comm="syz.1.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.883774][ T30] audit: type=1400 audit(1741733061.237:5432): avc: denied { prog_load } for pid=10452 comm="syz.1.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.940385][ T30] audit: type=1400 audit(1741733061.237:5433): avc: denied { create } for pid=10452 comm="syz.1.1799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 247.023525][ T30] audit: type=1400 audit(1741733061.267:5434): avc: denied { execmem } for pid=10451 comm="syz.2.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 247.110932][ T30] audit: type=1400 audit(1741733061.297:5435): avc: denied { mounton } for pid=10453 comm="syz.0.1800" path="/351/file0" dev="tmpfs" ino=1820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 247.190836][ T30] audit: type=1400 audit(1741733061.327:5436): avc: denied { map_create } for pid=10451 comm="syz.2.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.243999][ T30] audit: type=1400 audit(1741733061.327:5437): avc: denied { prog_load } for pid=10451 comm="syz.2.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.293301][ T30] audit: type=1400 audit(1741733061.327:5438): avc: denied { prog_load } for pid=10451 comm="syz.2.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 247.344276][ T30] audit: type=1400 audit(1741733061.327:5439): avc: denied { write } for pid=10451 comm="syz.2.1801" name="route" dev="proc" ino=4026533214 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 247.403345][ T30] audit: type=1400 audit(1741733061.387:5440): avc: denied { create } for pid=10458 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 247.702719][T10474] x_tables: unsorted underflow at hook 3 [ 249.748091][T10516] x_tables: unsorted underflow at hook 3 [ 251.848019][ T30] kauditd_printk_skb: 171 callbacks suppressed [ 251.849929][ T30] audit: type=1400 audit(1741733066.247:5612): avc: denied { map_create } for pid=10562 comm="syz.0.1843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.090633][ T30] audit: type=1400 audit(1741733066.247:5613): avc: denied { prog_load } for pid=10562 comm="syz.0.1843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.198125][ T30] audit: type=1400 audit(1741733066.277:5614): avc: denied { prog_load } for pid=10562 comm="syz.0.1843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.302047][T10571] pim6reg1: entered promiscuous mode [ 252.319736][ T30] audit: type=1400 audit(1741733066.277:5615): avc: denied { create } for pid=10560 comm="syz.1.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.350737][T10571] pim6reg1: entered allmulticast mode [ 252.375572][ T30] audit: type=1400 audit(1741733066.277:5616): avc: denied { read write } for pid=10562 comm="syz.0.1843" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 252.451535][ T30] audit: type=1400 audit(1741733066.277:5617): avc: denied { mounton } for pid=10562 comm="syz.0.1843" path="/358/file0" dev="tmpfs" ino=1858 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 252.530966][ T30] audit: type=1400 audit(1741733066.287:5618): avc: denied { map_create } for pid=10556 comm="syz.3.1840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.570946][ T30] audit: type=1400 audit(1741733066.297:5619): avc: denied { create } for pid=10560 comm="syz.1.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 252.625009][ T30] audit: type=1400 audit(1741733066.297:5620): avc: denied { prog_load } for pid=10556 comm="syz.3.1840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 252.674308][ T30] audit: type=1400 audit(1741733066.297:5621): avc: denied { prog_load } for pid=10556 comm="syz.3.1840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 253.122194][T10601] serio: Serial port ptm0 [ 255.399405][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.405856][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.738437][T10680] veth1_macvtap: left promiscuous mode [ 255.744165][T10680] macsec0: entered promiscuous mode [ 256.957613][ T30] kauditd_printk_skb: 259 callbacks suppressed [ 256.957628][ T30] audit: type=1400 audit(1741733071.357:5881): avc: denied { create } for pid=10697 comm="syz.1.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 257.230767][ T30] audit: type=1400 audit(1741733071.587:5882): avc: denied { execmem } for pid=10699 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 257.283218][ T30] audit: type=1400 audit(1741733071.687:5883): avc: denied { prog_load } for pid=10699 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.348799][ T30] audit: type=1400 audit(1741733071.687:5884): avc: denied { map_create } for pid=10699 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.408523][ T30] audit: type=1400 audit(1741733071.807:5885): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 257.476009][ T30] audit: type=1400 audit(1741733071.857:5886): avc: denied { map_create } for pid=10702 comm="syz.2.1902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.528431][ T30] audit: type=1400 audit(1741733071.867:5887): avc: denied { prog_load } for pid=10702 comm="syz.2.1902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.583965][ T30] audit: type=1400 audit(1741733071.867:5888): avc: denied { execmem } for pid=10703 comm="syz.0.1901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 257.621289][ T30] audit: type=1400 audit(1741733071.867:5889): avc: denied { mounton } for pid=10702 comm="syz.2.1902" path="/396/file0" dev="tmpfs" ino=2042 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 257.644227][ T30] audit: type=1400 audit(1741733071.917:5890): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.093494][ T30] kauditd_printk_skb: 281 callbacks suppressed [ 262.093509][ T30] audit: type=1400 audit(1741733076.497:6172): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.150810][ T30] audit: type=1400 audit(1741733076.537:6173): avc: denied { prog_load } for pid=10849 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.194041][ T30] audit: type=1400 audit(1741733076.547:6174): avc: denied { create } for pid=10849 comm="syz.2.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 262.234444][ T30] audit: type=1400 audit(1741733076.637:6175): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.319329][ T30] audit: type=1400 audit(1741733076.717:6176): avc: denied { mounton } for pid=10851 comm="syz.2.1959" path="/412/bus" dev="tmpfs" ino=2125 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 262.387312][ T30] audit: type=1400 audit(1741733076.787:6177): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.459886][ T30] audit: type=1400 audit(1741733076.817:6178): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 262.551176][ T30] audit: type=1400 audit(1741733076.827:6179): avc: denied { map_create } for pid=10853 comm="syz.3.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.622571][ T30] audit: type=1400 audit(1741733076.837:6180): avc: denied { prog_load } for pid=10853 comm="syz.3.1960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.703490][ T30] audit: type=1400 audit(1741733076.897:6181): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 263.916443][T10899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1898 sclass=netlink_route_socket pid=10899 comm=syz.0.1979 [ 265.349569][T10956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1554 sclass=netlink_route_socket pid=10956 comm=syz.3.2002 [ 267.025319][T11003] xt_bpf: check failed: parse error [ 267.123082][ T30] kauditd_printk_skb: 315 callbacks suppressed [ 267.123099][ T30] audit: type=1400 audit(1741733081.527:6497): avc: denied { create } for pid=11004 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=0 [ 267.220257][ T30] audit: type=1400 audit(1741733081.527:6498): avc: denied { prog_load } for pid=11004 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.295489][ T30] audit: type=1400 audit(1741733081.527:6499): avc: denied { map_create } for pid=11004 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.356124][ T30] audit: type=1400 audit(1741733081.527:6500): avc: denied { map_create } for pid=11004 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.579785][T11019] veth1_macvtap: left promiscuous mode [ 267.629890][T11019] macsec0: entered promiscuous mode [ 267.660747][ T30] audit: type=1400 audit(1741733081.537:6501): avc: denied { prog_load } for pid=11004 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.760808][ T30] audit: type=1400 audit(1741733081.557:6502): avc: denied { prog_load } for pid=11009 comm="syz.2.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.800770][ T30] audit: type=1400 audit(1741733081.557:6503): avc: denied { create } for pid=11009 comm="syz.2.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 267.844066][ T30] audit: type=1400 audit(1741733081.557:6504): avc: denied { create } for pid=11009 comm="syz.2.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 267.913587][ T30] audit: type=1400 audit(1741733081.567:6505): avc: denied { map_create } for pid=11006 comm="syz.4.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.964629][ T30] audit: type=1400 audit(1741733081.577:6506): avc: denied { prog_load } for pid=11006 comm="syz.4.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 268.740098][T11053] xt_TCPMSS: Only works on TCP SYN packets [ 269.107376][T11055] pim6reg1: entered promiscuous mode [ 269.113363][T11055] pim6reg1: entered allmulticast mode [ 272.465857][ T30] kauditd_printk_skb: 276 callbacks suppressed [ 272.465872][ T30] audit: type=1400 audit(1741733086.867:6783): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.496268][ C0] vkms_vblank_simulate: vblank timer overrun [ 272.545534][ T30] audit: type=1400 audit(1741733086.947:6784): avc: denied { name_bind } for pid=11156 comm="syz.3.2087" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 272.748316][ T30] audit: type=1400 audit(1741733087.147:6785): avc: denied { read } for pid=11159 comm="syz.0.2089" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 272.799585][ T30] audit: type=1400 audit(1741733087.177:6786): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.823775][ C0] vkms_vblank_simulate: vblank timer overrun [ 272.886388][ T30] audit: type=1400 audit(1741733087.247:6787): avc: denied { prog_load } for pid=11161 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.912627][ T30] audit: type=1400 audit(1741733087.247:6788): avc: denied { create } for pid=11161 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 272.934876][ T30] audit: type=1400 audit(1741733087.257:6789): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 272.959013][ C0] vkms_vblank_simulate: vblank timer overrun [ 272.984833][ T30] audit: type=1400 audit(1741733087.307:6790): avc: denied { map_create } for pid=11164 comm="syz.2.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 273.004545][ T30] audit: type=1400 audit(1741733087.317:6791): avc: denied { prog_load } for pid=11164 comm="syz.2.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 273.023641][ C0] vkms_vblank_simulate: vblank timer overrun [ 273.030422][ T30] audit: type=1400 audit(1741733087.317:6792): avc: denied { execmem } for pid=11164 comm="syz.2.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 274.256820][T11206] xt_CT: You must specify a L4 protocol and not use inversions on it [ 274.548610][T11229] x_tables: unsorted underflow at hook 3 [ 277.477678][ T30] kauditd_printk_skb: 293 callbacks suppressed [ 277.477692][ T30] audit: type=1400 audit(1741733091.877:7086): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 277.590792][ T30] audit: type=1400 audit(1741733091.977:7087): avc: denied { prog_load } for pid=11307 comm="syz.4.2146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.660921][ T30] audit: type=1400 audit(1741733091.987:7088): avc: denied { prog_load } for pid=11307 comm="syz.4.2146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.716618][ T30] audit: type=1400 audit(1741733091.997:7089): avc: denied { create } for pid=11307 comm="syz.4.2146" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 277.810853][ T30] audit: type=1400 audit(1741733091.997:7090): avc: denied { map_create } for pid=11307 comm="syz.4.2146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 277.930721][ T30] audit: type=1400 audit(1741733092.027:7091): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 278.020742][ T30] audit: type=1400 audit(1741733092.137:7092): avc: denied { map_create } for pid=11309 comm="syz.4.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 278.090743][ T30] audit: type=1400 audit(1741733092.177:7093): avc: denied { execmem } for pid=11309 comm="syz.4.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 278.160766][ T30] audit: type=1400 audit(1741733092.237:7094): avc: denied { map_create } for pid=11309 comm="syz.4.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 278.230723][ T30] audit: type=1400 audit(1741733092.237:7095): avc: denied { prog_load } for pid=11309 comm="syz.4.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 278.591186][T11313] pim6reg1: entered promiscuous mode [ 278.600770][T11313] pim6reg1: entered allmulticast mode Mar 11 22:44:55 syzkaller daemon.err dhcpcd[5490]: ps_sendpsmmsg: Connection refused Mar 11 22:44:55 syzkaller daemon.err dhcpcd[5490]: ps_root_recvmsgcb: failed to send message to pid 9633: Connection refused Mar 11 22:44:55 syzkaller daemon.err dhcpcd[5490]: ps_sendpsmmsg: Connection refused Mar 11 22:44:55 syzkaller daemon.err dhcpcd[5490]: ps_root_recvmsgcb: failed to send message to pid 9640: Connection refused Mar 11 22:44:56 syzkaller daemon.err dhcpcd[11402]: ps_bpf_start_bpf: bpf_open: Invalid argument Mar 11 22:44:56 syzkaller daemon.err dhcpcd[11402]: ps_root_recvmsg: Invalid argument Mar 11 22:44:56 syzkaller daemon.err dhcpcd[5490]: ps_sendpsmmsg: Connection refused Mar 11 22:44:56 syzkaller daemon.err dhcpcd[5490]: ps_root_recvmsgcb: failed to send message to pid 9705: Connection refused [ 282.534915][ T30] kauditd_printk_skb: 204 callbacks suppressed [ 282.534929][ T30] audit: type=1400 audit(1741733096.937:7300): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.594529][ T30] audit: type=1400 audit(1741733096.977:7301): avc: denied { create } for pid=11428 comm="syz.3.2199" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 282.616656][ T30] audit: type=1400 audit(1741733096.997:7302): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.661905][ T30] audit: type=1400 audit(1741733097.057:7303): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 282.694023][ T30] audit: type=1400 audit(1741733097.097:7304): avc: denied { prog_load } for pid=11433 comm="syz.1.2201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.713455][ T30] audit: type=1400 audit(1741733097.097:7305): avc: denied { prog_load } for pid=11437 comm="syz.2.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.733534][ T30] audit: type=1400 audit(1741733097.097:7306): avc: denied { prog_load } for pid=11437 comm="syz.2.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.753350][ T30] audit: type=1400 audit(1741733097.097:7307): avc: denied { map_create } for pid=11437 comm="syz.2.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.774165][ T30] audit: type=1400 audit(1741733097.097:7308): avc: denied { prog_load } for pid=11437 comm="syz.2.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 282.794285][ T30] audit: type=1400 audit(1741733097.097:7309): avc: denied { prog_load } for pid=11437 comm="syz.2.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Mar 11 22:44:57 syzkaller daemon.err dhcpcd[5490]: ps_sendpsmmsg: Connection refused Mar 11 22:44:57 syzkaller daemon.err dhcpcd[5490]: ps_root_recvmsgcb: failed to send message to pid 9695: Connection refused [ 284.174847][T11481] bridge0: entered allmulticast mode [ 286.596221][T11530] SELinux: syz.3.2240 (11530) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 287.559124][ T30] kauditd_printk_skb: 233 callbacks suppressed [ 287.559140][ T30] audit: type=1400 audit(1741733101.957:7543): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 287.620462][ T30] audit: type=1400 audit(1741733102.017:7544): avc: denied { prog_load } for pid=11558 comm="syz.2.2251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.646760][ T30] audit: type=1400 audit(1741733102.017:7545): avc: denied { create } for pid=11558 comm="syz.2.2251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 287.666997][ T30] audit: type=1326 audit(1741733102.017:7546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 287.702175][ T30] audit: type=1326 audit(1741733102.017:7547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 287.768549][ T30] audit: type=1326 audit(1741733102.017:7548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 287.842822][ T30] audit: type=1400 audit(1741733102.017:7549): avc: denied { map_create } for pid=11558 comm="syz.2.2251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 287.902947][ T30] audit: type=1326 audit(1741733102.017:7550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 287.938864][ T30] audit: type=1326 audit(1741733102.017:7551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 287.964562][ T30] audit: type=1326 audit(1741733102.017:7552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11558 comm="syz.2.2251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0fb218d169 code=0x7ffc0000 [ 292.575291][ T30] kauditd_printk_skb: 334 callbacks suppressed [ 292.575306][ T30] audit: type=1400 audit(1741733106.977:7887): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.651488][ T30] audit: type=1400 audit(1741733107.047:7888): avc: denied { read } for pid=11684 comm="syz.2.2303" dev="nsfs" ino=4026532856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 292.694381][ T30] audit: type=1400 audit(1741733107.087:7889): avc: denied { execmem } for pid=11684 comm="syz.2.2303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 292.745609][ T30] audit: type=1400 audit(1741733107.147:7890): avc: denied { prog_load } for pid=11684 comm="syz.2.2303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.790763][ T30] audit: type=1400 audit(1741733107.167:7891): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 292.881169][ T30] audit: type=1400 audit(1741733107.167:7892): avc: denied { prog_load } for pid=11684 comm="syz.2.2303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.900497][ T30] audit: type=1400 audit(1741733107.177:7893): avc: denied { name_bind } for pid=11684 comm="syz.2.2303" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 292.922988][ T30] audit: type=1400 audit(1741733107.197:7894): avc: denied { execmem } for pid=11687 comm="syz.3.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 292.942531][ T30] audit: type=1400 audit(1741733107.267:7895): avc: denied { map_create } for pid=11687 comm="syz.3.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 292.975309][ T30] audit: type=1400 audit(1741733107.267:7896): avc: denied { prog_load } for pid=11687 comm="syz.3.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.479773][T11705] veth1_macvtap: left promiscuous mode [ 293.510747][T11705] macsec0: entered promiscuous mode [ 297.589057][ T30] kauditd_printk_skb: 341 callbacks suppressed [ 297.589073][ T30] audit: type=1400 audit(1741733111.987:8238): avc: denied { execmem } for pid=11846 comm="syz.1.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 297.660747][ T30] audit: type=1400 audit(1741733112.037:8239): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 297.738529][ T30] audit: type=1400 audit(1741733112.037:8240): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 297.797714][ T30] audit: type=1400 audit(1741733112.107:8241): avc: denied { map_create } for pid=11846 comm="syz.1.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.847499][ T30] audit: type=1400 audit(1741733112.107:8242): avc: denied { prog_load } for pid=11846 comm="syz.1.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.906949][ T30] audit: type=1400 audit(1741733112.107:8243): avc: denied { prog_load } for pid=11846 comm="syz.1.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 297.964046][ T30] audit: type=1400 audit(1741733112.107:8244): avc: denied { create } for pid=11846 comm="syz.1.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 298.029371][ T30] audit: type=1400 audit(1741733112.347:8245): avc: denied { prog_load } for pid=11850 comm="syz.4.2375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.081951][ T30] audit: type=1400 audit(1741733112.347:8246): avc: denied { prog_load } for pid=11850 comm="syz.4.2375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.165198][ T30] audit: type=1400 audit(1741733112.407:8247): avc: denied { execmem } for pid=11850 comm="syz.4.2375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 301.071175][T11930] binfmt_misc: register: failed to install interpreter file ./file1 [ 301.144233][T11936] veth1_macvtap: left promiscuous mode [ 301.160717][T11936] macsec0: entered promiscuous mode [ 302.742749][ T30] kauditd_printk_skb: 316 callbacks suppressed [ 302.742764][ T30] audit: type=1400 audit(1741733117.147:8564): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 302.812543][ T30] audit: type=1400 audit(1741733117.217:8565): avc: denied { map_create } for pid=11979 comm="syz.4.2426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.854134][ T30] audit: type=1400 audit(1741733117.237:8566): avc: denied { prog_load } for pid=11979 comm="syz.4.2426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.913039][ T30] audit: type=1400 audit(1741733117.237:8567): avc: denied { prog_load } for pid=11979 comm="syz.4.2426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.954932][ T30] audit: type=1400 audit(1741733117.257:8568): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 303.021965][ T30] audit: type=1400 audit(1741733117.257:8569): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 303.085929][ T30] audit: type=1400 audit(1741733117.317:8570): avc: denied { prog_load } for pid=11981 comm="syz.4.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.151491][ T30] audit: type=1400 audit(1741733117.317:8571): avc: denied { map_create } for pid=11981 comm="syz.4.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.194189][ T30] audit: type=1400 audit(1741733117.317:8572): avc: denied { prog_load } for pid=11981 comm="syz.4.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.267956][ T30] audit: type=1400 audit(1741733117.317:8573): avc: denied { prog_load } for pid=11981 comm="syz.4.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 307.523683][T12089] tc_dump_action: action bad kind [ 307.770359][ T30] kauditd_printk_skb: 344 callbacks suppressed [ 307.770374][ T30] audit: type=1400 audit(1741733123.160:8918): avc: denied { read write } for pid=12096 comm="syz.1.2475" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 307.867734][ T30] audit: type=1400 audit(1741733123.220:8919): avc: denied { name_bind } for pid=12096 comm="syz.1.2475" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 307.943782][ T30] audit: type=1400 audit(1741733123.220:8920): avc: denied { create } for pid=12096 comm="syz.1.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 308.010934][ T30] audit: type=1400 audit(1741733123.220:8921): avc: denied { execmem } for pid=12096 comm="syz.1.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 308.051325][ T30] audit: type=1400 audit(1741733123.260:8922): avc: denied { read write } for pid=12098 comm="syz.2.2473" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 308.118698][ T30] audit: type=1400 audit(1741733123.260:8923): avc: denied { create } for pid=12096 comm="syz.1.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 308.149024][ T30] audit: type=1400 audit(1741733123.260:8924): avc: denied { prog_load } for pid=12096 comm="syz.1.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.169417][ T30] audit: type=1400 audit(1741733123.260:8925): avc: denied { prog_load } for pid=12096 comm="syz.1.2475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.188918][ T30] audit: type=1400 audit(1741733123.290:8926): avc: denied { prog_load } for pid=12098 comm="syz.2.2473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 308.228361][ T30] audit: type=1400 audit(1741733123.290:8927): avc: denied { map_create } for pid=12098 comm="syz.2.2473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 311.074779][T12200] pim6reg1: entered promiscuous mode [ 311.082340][T12200] pim6reg1: entered allmulticast mode [ 312.786535][ T30] kauditd_printk_skb: 324 callbacks suppressed [ 312.786550][ T30] audit: type=1400 audit(1741733128.180:9252): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 312.834142][ T30] audit: type=1400 audit(1741733128.230:9253): avc: denied { execmem } for pid=12273 comm="syz.1.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 312.855517][ T30] audit: type=1400 audit(1741733128.230:9254): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 312.884149][ T30] audit: type=1400 audit(1741733128.250:9255): avc: denied { prog_load } for pid=12275 comm="syz.2.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 312.928527][ T30] audit: type=1400 audit(1741733128.250:9256): avc: denied { map_create } for pid=12275 comm="syz.2.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 312.962008][ T30] audit: type=1400 audit(1741733128.250:9257): avc: denied { prog_load } for pid=12275 comm="syz.2.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.001135][ T30] audit: type=1400 audit(1741733128.250:9258): avc: denied { prog_load } for pid=12275 comm="syz.2.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 313.041035][ T30] audit: type=1400 audit(1741733128.280:9259): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 313.098674][ T30] audit: type=1400 audit(1741733128.310:9260): avc: denied { name_bind } for pid=12277 comm="syz.4.2552" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 313.514938][ T30] audit: type=1400 audit(1741733128.320:9261): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 314.185759][T12326] veth1_macvtap: entered promiscuous mode [ 314.191715][T12326] macsec0: entered allmulticast mode [ 314.196994][T12326] veth1_macvtap: entered allmulticast mode [ 315.018189][T12349] x_tables: unsorted underflow at hook 3 [ 315.191997][T12355] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 315.498059][T12363] SELinux: syz.1.2586 (12363) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 316.790950][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.797302][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.334560][T12424] pim6reg1: entered promiscuous mode [ 317.339971][T12424] pim6reg1: entered allmulticast mode [ 317.798983][ T30] kauditd_printk_skb: 356 callbacks suppressed [ 317.798999][ T30] audit: type=1400 audit(1741733133.190:9618): avc: denied { create } for pid=12441 comm="syz.3.2619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 317.866607][ T30] audit: type=1400 audit(1741733133.230:9619): avc: denied { read } for pid=12441 comm="syz.3.2619" dev="nsfs" ino=4026532875 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 317.950766][ T30] audit: type=1400 audit(1741733133.230:9620): avc: denied { create } for pid=12441 comm="syz.3.2619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 317.975834][ T30] audit: type=1400 audit(1741733133.230:9621): avc: denied { create } for pid=12441 comm="syz.3.2619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 423.000636][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 423.000655][ C1] rcu: 0-...!: (1 ticks this GP) idle=d5ac/1/0x4000000000000000 softirq=42940/42940 fqs=0 [ 423.001205][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12450/1:b..l [ 423.001236][ C1] rcu: (detected by 1, t=10503 jiffies, g=40901, q=441 ncpus=2) [ 423.001252][ C1] Sending NMI from CPU 1 to CPUs 0: [ 423.001277][ C0] NMI backtrace for cpu 0 [ 423.001286][ C0] CPU: 0 UID: 0 PID: 30 Comm: kauditd Not tainted 6.14.0-rc6-syzkaller-00007-g0b46b049d6ec #0 [ 423.001301][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 423.001308][ C0] RIP: 0010:kasan_check_range+0x14f/0x1a0 [ 423.001331][ C0] Code: 83 c0 01 49 89 d3 48 39 d0 74 11 80 38 00 74 ef 4d 8d 1c 2c 48 85 c0 48 89 c2 75 93 48 89 da 4c 89 d8 4c 29 da e9 2c ff ff ff <5b> b8 01 00 00 00 5d 41 5c c3 cc cc cc cc b8 01 00 00 00 c3 cc cc [ 423.001343][ C0] RSP: 0018:ffffc90000007c00 EFLAGS: 00000046 [ 423.001354][ C0] RAX: fffffbfff20c4c63 RBX: fffffbfff20c4c63 RCX: ffffffff8196b1a9 [ 423.001363][ C0] RDX: fffffbfff20c4c63 RSI: 0000000000000008 RDI: ffffffff90626310 [ 423.001371][ C0] RBP: fffffbfff20c4c62 R08: 0000000000000000 R09: fffffbfff20c4c62 [ 423.001380][ C0] R10: ffffffff90626317 R11: 0000000000000003 R12: ffffffff9aa57f90 [ 423.001389][ C0] R13: ffff88802b153340 R14: 1ffff92000000fa4 R15: ffffffff9aa57f70 [ 423.001398][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 423.001412][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 423.001421][ C0] CR2: 00007f5c89ba7bac CR3: 0000000035596000 CR4: 00000000003526f0 [ 423.001429][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 423.001438][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 423.001446][ C0] Call Trace: [ 423.001451][ C0] [ 423.001457][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 423.001473][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 423.001490][ C0] ? nmi_handle+0x1ac/0x5d0 [ 423.001508][ C0] ? kasan_check_range+0x14f/0x1a0 [ 423.001524][ C0] ? default_do_nmi+0x6a/0x160 [ 423.001537][ C0] ? exc_nmi+0x170/0x1e0 [ 423.001548][ C0] ? end_repeat_nmi+0xf/0x53 [ 423.001567][ C0] ? lock_release+0xa9/0x6f0 [ 423.001585][ C0] ? kasan_check_range+0x14f/0x1a0 [ 423.001601][ C0] ? kasan_check_range+0x14f/0x1a0 [ 423.001618][ C0] ? kasan_check_range+0x14f/0x1a0 [ 423.001634][ C0] [ 423.001638][ C0] [ 423.001643][ C0] lock_release+0xa9/0x6f0 [ 423.001659][ C0] ? debug_object_activate+0x2e6/0x4a0 [ 423.001675][ C0] ? __pfx_lock_release+0x10/0x10 [ 423.001692][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 423.001705][ C0] ? lock_acquire+0x2f/0xb0 [ 423.001721][ C0] ? debug_object_activate+0x149/0x4a0 [ 423.001737][ C0] _raw_spin_unlock_irqrestore+0x1a/0x80 [ 423.001752][ C0] debug_object_activate+0x2e6/0x4a0 [ 423.001767][ C0] ? lock_acquire.part.0+0x11b/0x380 [ 423.001784][ C0] ? __pfx_debug_object_activate+0x10/0x10 [ 423.001801][ C0] ? do_raw_spin_lock+0x12d/0x2c0 [ 423.001814][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 423.001826][ C0] ? __pfx_advance_sched+0x10/0x10 [ 423.001839][ C0] enqueue_hrtimer+0x25/0x3c0 [ 423.001853][ C0] __hrtimer_run_queues+0x903/0xae0 [ 423.001868][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 423.001881][ C0] ? read_tsc+0x9/0x20 [ 423.001895][ C0] ? rcu_is_watching+0x12/0xc0 [ 423.001909][ C0] hrtimer_interrupt+0x392/0x8e0 [ 423.001926][ C0] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 423.001946][ C0] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 423.001961][ C0] [ 423.001965][ C0] [ 423.001969][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 423.001987][ C0] RIP: 0010:console_flush_all+0x9a4/0xc60 [ 423.002001][ C0] Code: 00 e8 90 01 28 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 be 44 20 00 48 85 db 0f 85 55 01 00 00 e8 80 49 20 00 fb 4c 89 e0 <48> c1 e8 03 42 80 3c 38 00 0f 84 11 ff ff ff 4c 89 e7 e8 b5 67 83 [ 423.002013][ C0] RSP: 0018:ffffc90000a679d0 EFLAGS: 00000293 [ 423.002023][ C0] RAX: ffffffff8eeace78 RBX: 0000000000000000 RCX: ffffffff8199a752 [ 423.002031][ C0] RDX: ffff88801daec880 RSI: ffffffff8199a760 RDI: 0000000000000007 [ 423.002040][ C0] RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 [ 423.002048][ C0] R10: 0000000000000000 R11: 0000000000000003 R12: ffffffff8eeace78 [ 423.002056][ C0] R13: ffffffff8eeace20 R14: ffffc90000a67a60 R15: dffffc0000000000 [ 423.002067][ C0] ? console_flush_all+0x992/0xc60 [ 423.002080][ C0] ? console_flush_all+0x9a0/0xc60 [ 423.002096][ C0] ? __pfx_console_flush_all+0x10/0x10 [ 423.002118][ C0] ? is_printk_cpu_sync_owner+0x32/0x40 [ 423.002134][ C0] console_unlock+0xd9/0x210 [ 423.002146][ C0] ? __pfx_console_unlock+0x10/0x10 [ 423.002158][ C0] ? lock_acquire+0x2f/0xb0 [ 423.002174][ C0] ? _printk+0xc8/0x100 [ 423.002191][ C0] ? __down_trylock_console_sem+0xb0/0x140 [ 423.002209][ C0] vprintk_emit+0x424/0x6f0 [ 423.002223][ C0] ? __pfx_vprintk_emit+0x10/0x10 [ 423.002236][ C0] ? __pfx_lock_release+0x10/0x10 [ 423.002252][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 423.002268][ C0] ? __pfx_kauditd_send_multicast_skb+0x10/0x10 [ 423.002283][ C0] _printk+0xc8/0x100 [ 423.002299][ C0] ? __pfx__printk+0x10/0x10 [ 423.002325][ C0] ? ___ratelimit+0x24c/0x570 [ 423.002341][ C0] ? __pfx____ratelimit+0x10/0x10 [ 423.002356][ C0] ? kauditd_hold_skb+0x1bc/0x250 [ 423.002371][ C0] kauditd_hold_skb+0x205/0x250 [ 423.002387][ C0] kauditd_send_queue+0x236/0x290 [ 423.002402][ C0] ? __pfx_kauditd_hold_skb+0x10/0x10 [ 423.002419][ C0] kauditd_thread+0x611/0xa60 [ 423.002434][ C0] ? __pfx_kauditd_thread+0x10/0x10 [ 423.002450][ C0] ? __pfx_autoremove_wake_function+0x10/0x10 [ 423.002467][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 423.002483][ C0] ? __kthread_parkme+0x148/0x220 [ 423.002496][ C0] ? __pfx_kauditd_thread+0x10/0x10 [ 423.002512][ C0] kthread+0x3af/0x750 [ 423.002527][ C0] ? __pfx_kthread+0x10/0x10 [ 423.002543][ C0] ? __pfx_kthread+0x10/0x10 [ 423.002558][ C0] ret_from_fork+0x45/0x80 [ 423.002573][ C0] ? __pfx_kthread+0x10/0x10 [ 423.002588][ C0] ret_from_fork_asm+0x1a/0x30 [ 423.002606][ C0] [ 423.003273][ C1] task:syz.2.2624 state:R running task stack:27648 pid:12450 tgid:12450 ppid:5821 task_flags:0x40004c flags:0x00004000 [ 423.003329][ C1] Call Trace: [ 423.003335][ C1] [ 423.003345][ C1] __schedule+0xf43/0x5890 [ 423.003370][ C1] ? hlock_class+0x4e/0x130 [ 423.003390][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 423.003414][ C1] ? __pfx_mark_lock+0x10/0x10 [ 423.003438][ C1] ? __pfx___schedule+0x10/0x10 [ 423.003460][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 423.003487][ C1] ? preempt_schedule_thunk+0x1a/0x30 [ 423.003509][ C1] preempt_schedule_common+0x44/0xc0 [ 423.003529][ C1] preempt_schedule_thunk+0x1a/0x30 [ 423.003555][ C1] _raw_spin_unlock+0x3e/0x50 [ 423.003573][ C1] unmap_page_range+0xee3/0x4350 [ 423.003615][ C1] ? __pfx_unmap_page_range+0x10/0x10 [ 423.003641][ C1] ? mas_next_slot+0x12d3/0x21b0 [ 423.003666][ C1] ? uprobe_munmap+0x20/0x5c0 [ 423.003685][ C1] unmap_single_vma+0x194/0x2b0 [ 423.003712][ C1] unmap_vmas+0x22f/0x490 [ 423.003738][ C1] ? __pfx_unmap_vmas+0x10/0x10 [ 423.003765][ C1] ? mas_next_slot+0x12d3/0x21b0 [ 423.003800][ C1] exit_mmap+0x1c1/0xba0 [ 423.003819][ C1] ? __pfx_exit_mmap+0x10/0x10 [ 423.003839][ C1] ? __pfx_mark_lock+0x10/0x10 [ 423.003879][ C1] __mmput+0x12a/0x410 [ 423.003906][ C1] mmput+0x62/0x70 [ 423.003928][ C1] do_exit+0x9ba/0x2d70 [ 423.003945][ C1] ? do_group_exit+0x1c3/0x2a0 [ 423.003963][ C1] ? __pfx_lock_release+0x10/0x10 [ 423.003987][ C1] ? __pfx_do_exit+0x10/0x10 [ 423.004012][ C1] do_group_exit+0xd3/0x2a0 [ 423.004032][ C1] __x64_sys_exit_group+0x3e/0x50 [ 423.004050][ C1] x64_sys_call+0x151f/0x1720 [ 423.004067][ C1] do_syscall_64+0xcd/0x250 [ 423.004090][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.004111][ C1] RIP: 0033:0x7f0fb218d169 [ 423.004124][ C1] RSP: 002b:00007ffe533c7f38 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 423.004141][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fb218d169 [ 423.004152][ C1] RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 [ 423.004163][ C1] RBP: 00007ffe533c7f9c R08: 0000001e533c802f R09: 00000000000927c0 [ 423.004174][ C1] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000227 [ 423.004185][ C1] R13: 00000000000927c0 R14: 000000000004d98f R15: 00007ffe533c7ff0 [ 423.004208][ C1] [ 423.004215][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 10502 jiffies! g40901 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 423.004232][ C1] rcu: Possible timer handling issue on cpu=0 timer-softirq=21833 [ 423.004242][ C1] rcu: rcu_preempt kthread starved for 10503 jiffies! g40901 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 423.004259][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 423.004268][ C1] rcu: RCU grace-period kthread stack dump: [ 423.004274][ C1] task:rcu_preempt state:I stack:27552 pid:18 tgid:18 ppid:2 task_flags:0x208040 flags:0x00004000 [ 423.004324][ C1] Call Trace: [ 423.004330][ C1] [ 423.004339][ C1] __schedule+0xf43/0x5890 [ 423.004363][ C1] ? __pfx___lock_acquire+0x10/0x10 [ 423.004396][ C1] ? __pfx___schedule+0x10/0x10 [ 423.004416][ C1] ? schedule+0x298/0x350 [ 423.004433][ C1] ? __pfx_lock_release+0x10/0x10 [ 423.004459][ C1] ? lock_acquire+0x2f/0xb0 [ 423.004479][ C1] ? schedule+0x1fd/0x350 [ 423.004500][ C1] schedule+0xe7/0x350 [ 423.004519][ C1] schedule_timeout+0x124/0x280 [ 423.004535][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 423.004553][ C1] ? __pfx_process_timeout+0x10/0x10 [ 423.004574][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 423.004593][ C1] ? prepare_to_swait_event+0xf3/0x470 [ 423.004620][ C1] rcu_gp_fqs_loop+0x1eb/0xb00 [ 423.004645][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 423.004667][ C1] ? rcu_gp_init+0xc82/0x1630 [ 423.004692][ C1] ? _raw_spin_unlock_irq+0x2e/0x50 [ 423.004715][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 423.004737][ C1] rcu_gp_kthread+0x271/0x380 [ 423.004760][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 423.004784][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 423.004806][ C1] ? __kthread_parkme+0x148/0x220 [ 423.004823][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 423.004848][ C1] kthread+0x3af/0x750 [ 423.004866][ C1] ? __pfx_kthread+0x10/0x10 [ 423.004890][ C1] ? __pfx_kthread+0x10/0x10 [ 423.004910][ C1] ret_from_fork+0x45/0x80 [ 423.004931][ C1] ? __pfx_kthread+0x10/0x10 [ 423.004950][ C1] ret_from_fork_asm+0x1a/0x30 [ 423.004979][ C1] [ 573.918749][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kworker/u8:1:13] [ 573.918768][ C1] Modules linked in: [ 573.918777][ C1] irq event stamp: 9043796 [ 573.918782][ C1] hardirqs last enabled at (9043795): [] irqentry_exit+0x3b/0x90 [ 573.918810][ C1] hardirqs last disabled at (9043796): [] sysvec_apic_timer_interrupt+0xe/0xc0 [ 573.918831][ C1] softirqs last enabled at (9043792): [] handle_softirqs+0x5bb/0x8f0 [ 573.918857][ C1] softirqs last disabled at (9043757): [] __irq_exit_rcu+0x109/0x170 [ 573.918884][ C1] CPU: 1 UID: 0 PID: 13 Comm: kworker/u8:1 Not tainted 6.14.0-rc6-syzkaller-00007-g0b46b049d6ec #0 [ 573.918902][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 573.918912][ C1] Workqueue: netns cleanup_net [ 573.918927][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 [ 573.918952][ C1] Code: 49 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 2c 16 00 00 85 c0 74 2b <8b> 82 08 16 00 00 83 f8 02 75 20 48 8b 8a 10 16 00 00 8b 92 0c 16 [ 573.918968][ C1] RSP: 0018:ffffc90000127798 EFLAGS: 00000246 [ 573.918980][ C1] RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff81adfc17 [ 573.918990][ C1] RDX: ffff88801c2f0000 RSI: ffffffff81adfc05 RDI: 0000000000000005 [ 573.919000][ C1] RBP: ffffc90000127878 R08: 0000000000000005 R09: 0000000000000000 [ 573.919010][ C1] R10: 0000000000000001 R11: 0000000000000004 R12: 1ffff92000024ef8 [ 573.919019][ C1] R13: 0000000000000000 R14: 0000000000000001 R15: ffff8880b863fbc0 [ 573.919029][ C1] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 573.919045][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 573.919056][ C1] CR2: 00007f5c877f5f98 CR3: 0000000030b90000 CR4: 00000000003526f0 [ 573.919066][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 573.919075][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 573.919085][ C1] Call Trace: [ 573.919090][ C1] [ 573.919097][ C1] ? watchdog_timer_fn+0x570/0x7d0 [ 573.919115][ C1] ? __pfx_watchdog_timer_fn+0x10/0x10 [ 573.919130][ C1] ? __hrtimer_run_queues+0x5fb/0xae0 [ 573.919153][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 573.919168][ C1] ? read_tsc+0x9/0x20 [ 573.919193][ C1] ? hrtimer_interrupt+0x392/0x8e0 [ 573.919219][ C1] ? __sysvec_apic_timer_interrupt+0x10f/0x400 [ 573.919244][ C1] ? sysvec_apic_timer_interrupt+0x9f/0xc0 [ 573.919262][ C1] [ 573.919267][ C1] [ 573.919273][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 573.919301][ C1] ? smp_call_function_single+0x1d7/0x580 [ 573.919318][ C1] ? smp_call_function_single+0x1c5/0x580 [ 573.919336][ C1] ? __sanitizer_cov_trace_pc+0x3b/0x70 [ 573.919361][ C1] smp_call_function_single+0x1c5/0x580 [ 573.919378][ C1] ? __pfx_rcu_barrier_handler+0x10/0x10 [ 573.919398][ C1] ? __pfx_smp_call_function_single+0x10/0x10 [ 573.919417][ C1] ? __pfx_rcu_barrier_handler+0x10/0x10 [ 573.919436][ C1] ? mark_held_locks+0x9f/0xe0 [ 573.919458][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 573.919480][ C1] rcu_barrier+0x28d/0x700 [ 573.919513][ C1] netdev_run_todo+0x2eb/0x1320 [ 573.919536][ C1] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 573.919560][ C1] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 573.919581][ C1] ? __pfx_netdev_run_todo+0x10/0x10 [ 573.919604][ C1] ? cfg802154_pernet_exit+0x17/0xe0 [ 573.919627][ C1] ? unregister_netdevice_queue+0x22f/0x3f0 [ 573.919651][ C1] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 573.919677][ C1] ? __pfx___might_resched+0x10/0x10 [ 573.919700][ C1] ? __rtnl_unlock+0x68/0xf0 [ 573.919727][ C1] default_device_exit_batch+0x86c/0xae0 [ 573.919757][ C1] ? __pfx_default_device_exit_batch+0x10/0x10 [ 573.919782][ C1] ? __pfx_rdma_dev_exit_net+0x10/0x10 [ 573.919806][ C1] ? __pfx___might_resched+0x10/0x10 [ 573.919830][ C1] ? __pfx_default_device_exit_batch+0x10/0x10 [ 573.919856][ C1] ops_exit_list+0x128/0x180 [ 573.919880][ C1] cleanup_net+0x5c6/0xb30 [ 573.919896][ C1] ? __pfx_cleanup_net+0x10/0x10 [ 573.919915][ C1] ? lock_acquire+0x2f/0xb0 [ 573.919935][ C1] ? process_one_work+0x921/0x1ba0 [ 573.919958][ C1] process_one_work+0x9c5/0x1ba0 [ 573.919986][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 573.920007][ C1] ? __pfx_process_one_work+0x10/0x10 [ 573.920034][ C1] ? assign_work+0x1a0/0x250 [ 573.920055][ C1] worker_thread+0x6c8/0xf00 [ 573.920085][ C1] ? __pfx_worker_thread+0x10/0x10 [ 573.920106][ C1] kthread+0x3af/0x750 [ 573.920125][ C1] ? __pfx_kthread+0x10/0x10 [ 573.920142][ C1] ? lock_acquire+0x2f/0xb0 [ 573.920166][ C1] ? __pfx_kthread+0x10/0x10 [ 573.920185][ C1] ret_from_fork+0x45/0x80 [ 573.920204][ C1] ? __pfx_kthread+0x10/0x10 [ 573.920223][ C1] ret_from_fork_asm+0x1a/0x30 [ 573.920250][ C1] [ 573.920256][ C1] Sending NMI from CPU 1 to CPUs 0: [ 573.920278][ C0] NMI backtrace for cpu 0 [ 573.920285][ C0] CPU: 0 UID: 0 PID: 30 Comm: kauditd Not tainted 6.14.0-rc6-syzkaller-00007-g0b46b049d6ec #0 [ 573.920299][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 573.920305][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x1e/0x70 [ 573.920324][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 15 54 e8 49 7e 65 8b 05 55 e8 49 7e a9 00 01 ff 00 48 8b 34 24 74 1d c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 2c [ 573.920336][ C0] RSP: 0018:ffffc90000007e28 EFLAGS: 00000006 [ 573.920345][ C0] RAX: 0000000000010002 RBX: 1bc16d674fd3f438 RCX: ffffffff81a72135 [ 573.920353][ C0] RDX: ffff88801daec880 RSI: ffffffff81a72143 RDI: 0000000000000006 [ 573.920361][ C0] RBP: 1845d04a88000000 R08: 0000000000000006 R09: 1845d04a88000000 [ 573.920369][ C0] R10: 1bc16d674fd3f438 R11: 0000000000000003 R12: ffff88802b153340 [ 573.920377][ C0] R13: ffff8880b862c780 R14: ffff8880b862c680 R15: ffffffff896ad410 [ 573.920385][ C0] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 573.920397][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 573.920406][ C0] CR2: 00007f5c89ba7bac CR3: 0000000035596000 CR4: 00000000003526f0 [ 573.920414][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 573.920421][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 573.920429][ C0] Call Trace: [ 573.920432][ C0] [ 573.920437][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 573.920451][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 573.920466][ C0] ? nmi_handle+0x1ac/0x5d0 [ 573.920483][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 573.920501][ C0] ? default_do_nmi+0x6a/0x160 [ 573.920513][ C0] ? exc_nmi+0x170/0x1e0 [ 573.920523][ C0] ? end_repeat_nmi+0xf/0x53 [ 573.920539][ C0] ? __pfx_advance_sched+0x10/0x10 [ 573.920553][ C0] ? __hrtimer_run_queues+0x415/0xae0 [ 573.920564][ C0] ? __hrtimer_run_queues+0x423/0xae0 [ 573.920576][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 573.920594][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 573.920612][ C0] ? __sanitizer_cov_trace_pc+0x1e/0x70 [ 573.920630][ C0] [ 573.920634][ C0] [ 573.920638][ C0] __hrtimer_run_queues+0x423/0xae0 [ 573.920653][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 573.920665][ C0] ? read_tsc+0x9/0x20 [ 573.920678][ C0] ? rcu_is_watching+0x12/0xc0 [ 573.920691][ C0] hrtimer_interrupt+0x392/0x8e0 [ 573.920707][ C0] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 573.920726][ C0] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 573.920740][ C0] [ 573.920744][ C0] [ 573.920748][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 573.920765][ C0] RIP: 0010:console_flush_all+0x9a4/0xc60 [ 573.920779][ C0] Code: 00 e8 90 01 28 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 be 44 20 00 48 85 db 0f 85 55 01 00 00 e8 80 49 20 00 fb 4c 89 e0 <48> c1 e8 03 42 80 3c 38 00 0f 84 11 ff ff ff 4c 89 e7 e8 b5 67 83 [ 573.920790][ C0] RSP: 0018:ffffc90000a679d0 EFLAGS: 00000293 [ 573.920800][ C0] RAX: ffffffff8eeace78 RBX: 0000000000000000 RCX: ffffffff8199a752 [ 573.920807][ C0] RDX: ffff88801daec880 RSI: ffffffff8199a760 RDI: 0000000000000007 [ 573.920815][ C0] RBP: 0000000000000000 R08: 0000000000000007 R09: 0000000000000000 [ 573.920822][ C0] R10: 0000000000000000 R11: 0000000000000003 R12: ffffffff8eeace78 [ 573.920830][ C0] R13: ffffffff8eeace20 R14: ffffc90000a67a60 R15: dffffc0000000000 [ 573.920840][ C0] ? console_flush_all+0x992/0xc60 [ 573.920853][ C0] ? console_flush_all+0x9a0/0xc60 [ 573.920869][ C0] ? __pfx_console_flush_all+0x10/0x10 [ 573.920884][ C0] ? is_printk_cpu_sync_owner+0x32/0x40 [ 573.920900][ C0] console_unlock+0xd9/0x210 [ 573.920912][ C0] ? __pfx_console_unlock+0x10/0x10 [ 573.920924][ C0] ? lock_acquire+0x2f/0xb0 [ 573.920940][ C0] ? _printk+0xc8/0x100 [ 573.920956][ C0] ? __down_trylock_console_sem+0xb0/0x140 [ 573.920973][ C0] vprintk_emit+0x424/0x6f0 [ 573.920987][ C0] ? __pfx_vprintk_emit+0x10/0x10 [ 573.920998][ C0] ? __pfx_lock_release+0x10/0x10 [ 573.921014][ C0] ? trace_lock_acquire+0x14e/0x1f0 [ 573.921030][ C0] ? __pfx_kauditd_send_multicast_skb+0x10/0x10 [ 573.921046][ C0] _printk+0xc8/0x100 [ 573.921062][ C0] ? __pfx__printk+0x10/0x10 [ 573.921078][ C0] ? ___ratelimit+0x24c/0x570 [ 573.921093][ C0] ? __pfx____ratelimit+0x10/0x10 [ 573.921108][ C0] ? kauditd_hold_skb+0x1bc/0x250 [ 573.921124][ C0] kauditd_hold_skb+0x205/0x250 [ 573.921139][ C0] kauditd_send_queue+0x236/0x290 [ 573.921154][ C0] ? __pfx_kauditd_hold_skb+0x10/0x10 [ 573.921170][ C0] kauditd_thread+0x611/0xa60 [ 573.921185][ C0] ? __pfx_kauditd_thread+0x10/0x10 [ 573.921201][ C0] ? __pfx_autoremove_wake_function+0x10/0x10 [ 573.921217][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 573.921232][ C0] ? __kthread_parkme+0x148/0x220 [ 573.921249][ C0] ? __pfx_kauditd_thread+0x10/0x10 [ 573.921264][ C0] kthread+0x3af/0x750 [ 573.921278][ C0] ? __pfx_kthread+0x10/0x10 [ 573.921294][ C0] ? __pfx_kthread+0x10/0x10 [ 573.921308][ C0] ret_from_fork+0x45/0x80 [ 573.921323][ C0] ? __pfx_kthread+0x10/0x10 [ 573.921337][ C0] ret_from_fork_asm+0x1a/0x30 [ 573.921355][ C0] [ 573.922276][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 573.922286][ C1] CPU: 1 UID: 0 PID: 13 Comm: kworker/u8:1 Tainted: G L 6.14.0-rc6-syzkaller-00007-g0b46b049d6ec #0 [ 573.922308][ C1] Tainted: [L]=SOFTLOCKUP [ 573.922314][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 573.922324][ C1] Workqueue: netns cleanup_net [ 573.922339][ C1] Call Trace: [ 573.922344][ C1] [ 573.922351][ C1] dump_stack_lvl+0x3d/0x1f0 [ 573.922373][ C1] panic+0x71d/0x800 [ 573.922391][ C1] ? __pfx_panic+0x10/0x10 [ 573.922408][ C1] ? __pfx__printk+0x10/0x10 [ 573.922432][ C1] ? irq_work_claim+0x76/0xa0 [ 573.922456][ C1] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 573.922477][ C1] ? irq_work_queue+0x2a/0x80 [ 573.922504][ C1] ? watchdog_timer_fn+0x5f2/0x7d0 [ 573.922518][ C1] ? watchdog_timer_fn+0x5e5/0x7d0 [ 573.922538][ C1] watchdog_timer_fn+0x603/0x7d0 [ 573.922555][ C1] ? __pfx_watchdog_timer_fn+0x10/0x10 [ 573.922570][ C1] __hrtimer_run_queues+0x5fb/0xae0 [ 573.922593][ C1] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 573.922608][ C1] ? read_tsc+0x9/0x20 [ 573.922633][ C1] hrtimer_interrupt+0x392/0x8e0 [ 573.922660][ C1] __sysvec_apic_timer_interrupt+0x10f/0x400 [ 573.922685][ C1] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 573.922704][ C1] [ 573.922710][ C1] [ 573.922717][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 573.922739][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x3b/0x70 [ 573.922762][ C1] Code: 49 7e a9 00 01 ff 00 48 8b 34 24 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 2c 16 00 00 85 c0 74 2b <8b> 82 08 16 00 00 83 f8 02 75 20 48 8b 8a 10 16 00 00 8b 92 0c 16 [ 573.922776][ C1] RSP: 0018:ffffc90000127798 EFLAGS: 00000246 [ 573.922789][ C1] RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff81adfc17 [ 573.922799][ C1] RDX: ffff88801c2f0000 RSI: ffffffff81adfc05 RDI: 0000000000000005 [ 573.922810][ C1] RBP: ffffc90000127878 R08: 0000000000000005 R09: 0000000000000000 [ 573.922819][ C1] R10: 0000000000000001 R11: 0000000000000004 R12: 1ffff92000024ef8 [ 573.922829][ C1] R13: 0000000000000000 R14: 0000000000000001 R15: ffff8880b863fbc0 [ 573.922846][ C1] ? smp_call_function_single+0x1d7/0x580 [ 573.922863][ C1] ? smp_call_function_single+0x1c5/0x580 [ 573.922884][ C1] smp_call_function_single+0x1c5/0x580 [ 573.922901][ C1] ? __pfx_rcu_barrier_handler+0x10/0x10 [ 573.922920][ C1] ? __pfx_smp_call_function_single+0x10/0x10 [ 573.922938][ C1] ? __pfx_rcu_barrier_handler+0x10/0x10 [ 573.922957][ C1] ? mark_held_locks+0x9f/0xe0 [ 573.922980][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 573.923002][ C1] rcu_barrier+0x28d/0x700 [ 573.923031][ C1] netdev_run_todo+0x2eb/0x1320 [ 573.923055][ C1] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 573.923079][ C1] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 573.923100][ C1] ? __pfx_netdev_run_todo+0x10/0x10 [ 573.923123][ C1] ? cfg802154_pernet_exit+0x17/0xe0 [ 573.923146][ C1] ? unregister_netdevice_queue+0x22f/0x3f0 [ 573.923170][ C1] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 573.923196][ C1] ? __pfx___might_resched+0x10/0x10 [ 573.923218][ C1] ? __rtnl_unlock+0x68/0xf0 [ 573.923245][ C1] default_device_exit_batch+0x86c/0xae0 [ 573.923276][ C1] ? __pfx_default_device_exit_batch+0x10/0x10 [ 573.923301][ C1] ? __pfx_rdma_dev_exit_net+0x10/0x10 [ 573.923325][ C1] ? __pfx___might_resched+0x10/0x10 [ 573.923350][ C1] ? __pfx_default_device_exit_batch+0x10/0x10 [ 573.923377][ C1] ops_exit_list+0x128/0x180 [ 573.923402][ C1] cleanup_net+0x5c6/0xb30 [ 573.923420][ C1] ? __pfx_cleanup_net+0x10/0x10 [ 573.923439][ C1] ? lock_acquire+0x2f/0xb0 [ 573.923459][ C1] ? process_one_work+0x921/0x1ba0 [ 573.923483][ C1] process_one_work+0x9c5/0x1ba0 [ 573.923518][ C1] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 573.923540][ C1] ? __pfx_process_one_work+0x10/0x10 [ 573.923569][ C1] ? assign_work+0x1a0/0x250 [ 573.923591][ C1] worker_thread+0x6c8/0xf00 [ 573.923622][ C1] ? __pfx_worker_thread+0x10/0x10 [ 573.923644][ C1] kthread+0x3af/0x750 [ 573.923663][ C1] ? __pfx_kthread+0x10/0x10 [ 573.923681][ C1] ? lock_acquire+0x2f/0xb0 [ 573.923706][ C1] ? __pfx_kthread+0x10/0x10 [ 573.923726][ C1] ret_from_fork+0x45/0x80 [ 573.923746][ C1] ? __pfx_kthread+0x10/0x10 [ 573.923765][ C1] ret_from_fork_asm+0x1a/0x30 [ 573.923794][ C1] [ 575.003509][ C1] Shutting down cpus with NMI [ 575.003706][ C1] Kernel Offset: disabled