last executing test programs: 7m55.597822979s ago: executing program 3 (id=1144): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r1 = epoll_create(0x3ff) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000240)={0xa0000000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000280)={0x2000000}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000008c0)=@newtaction={0x21c, 0x30, 0xb, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x6a00}, [{0x4}, {0x204, 0x1, [@m_ctinfo={0x8c, 0x6, 0x0, 0x0, {{0xb}, {0x4}, {0x60, 0x6, "e0b99b68e61f5b269385aef67add251c43e68a310f87b348515244e87189f2c704a114faedd5c9297aca9c8ed04735407ed4b148e1ecf9fe7e68a51b41d451e152f8a106b8f6bb58bf149bafef1de326c3a390dde401192666d79a3f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x6}}}}, @m_gact={0x174, 0x1f, 0x0, 0x0, {{0x9}, {0x4c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0x2098, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x100, 0x4, 0x2, 0xc521}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1221, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x9, 0x2, 0x2, 0x1, 0x9}}]}, {0xfe, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x21c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r5], 0x20}, 0x1, 0x0, 0x0, 0x80d5}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x3, [@volatile={0x0, 0x0, 0x0, 0x9, 0x4}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x5}, @type_tag={0x3, 0x0, 0x0, 0x12, 0x5}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x1, 0x1}, @restrict={0x7, 0x0, 0x0, 0xb, 0x2}, @typedef={0xa, 0x0, 0x0, 0x8, 0x4}, @fwd={0x8}]}, {0x0, [0x19af913155fcfdbe]}}, &(0x7f0000000480)=""/143, 0x73, 0x8f, 0x1, 0x244, 0x10000, @value}, 0x28) 7m55.513691929s ago: executing program 3 (id=1147): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x54e, &(0x7f00000014c0)="$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") lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=r1, @ANYBLOB="040000000000800008000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) open(&(0x7f0000000040)='.\x00', 0x418601, 0x8) 7m55.495175049s ago: executing program 3 (id=1148): syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x10, 0x400000002, 0x0) socket$unix(0x1, 0x5, 0x0) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) socket$inet_mptcp(0x2, 0x1, 0x106) socket$inet6_sctp(0xa, 0x801, 0x84) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x54}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x200000000000000) 7m55.477856919s ago: executing program 3 (id=1149): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x500082c) setxattr$incfs_metadata(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) renameat2(r1, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f00000003c0)='./bus\x00', 0x0) 7m55.457542528s ago: executing program 3 (id=1150): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)='Q', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) (fail_nth: 7) 7m55.337631388s ago: executing program 3 (id=1153): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) flock(r1, 0x6) 7m55.337442088s ago: executing program 32 (id=1153): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) flock(r1, 0x6) 7m39.189559096s ago: executing program 1 (id=1567): syz_emit_ethernet(0x42, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffff000000000000080045000034000000000067907800000000e00000012101907812000228260000240000deffffffffffab141411e000000094040100"], 0x0) io_setup(0x7, 0x0) r0 = io_uring_setup(0x766d, &(0x7f0000000880)={0x0, 0xd277, 0x0, 0x0, 0x128}) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0xc620, @local}, 0x10) listen(r1, 0x3) r2 = socket$inet(0x2, 0x800, 0x4) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000280)=0x3, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0xce20, @local}, 0x10) listen(r2, 0x3) close_range(r0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = gettid() process_vm_writev(r4, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/246, 0xf6}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xfffffec0}], 0x1, 0x0) 7m39.141907376s ago: executing program 1 (id=1568): r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000200000014000200626f6e643000000000000000000000000900010073"], 0x40}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235d957eaa9a40b764e5381ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115093889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694a9417d68694f17ba5e27ea1cec518b93fadcfe0de010ae9be3273ff73c34b5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6ef3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436cc24babaae409f0aab0b40af116001bc85492455956e853ead08b5793d4ecf72378a3dfd9cc837b1c66212d9a2be8fd6341c2f837c7fe09924a51ec42912856cce3d3b2d092c80813aad03e1e63a655f4138730f302df339f30a4fbd453c9a0fba381d071ad7cb80a52bec572e29b0b9b55c235806b97e166609f8083ce776075c"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00), 0x22201, 0x0) inotify_add_watch(r5, 0x0, 0x80000000) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x80000001, 0x800}}, './file0\x00'}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000300)={0xfffffffb, 0x2, 0x1, 'queue0\x00'}) dup3(r4, r6, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_dev$evdev(&(0x7f00000001c0), 0x8000000000000000, 0x4000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) clock_adjtime(0x0, &(0x7f0000000440)={0x66b9, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x248a, 0xfffffffffffffc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x10c42, &(0x7f0000000d80)=ANY=[@ANYRESHEX], 0x1, 0x27a, &(0x7f0000000540)="$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") memfd_secret(0x80000) r7 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r7, 0x89b0, &(0x7f0000000180)={'bond0\x00', &(0x7f0000000040)=@ethtool_pauseparam={0x1}}) socket$netlink(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x28, 0x5, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 7m38.099748033s ago: executing program 1 (id=1580): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000140)={0x10, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, 0x0, 0x0) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6, 0xffffffffffffffff}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) r9 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000000)='cpu\t&0&&\t') syz_emit_ethernet(0x6d, &(0x7f00000003c0)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x5f, 0x65, 0x0, 0x0, 0x21, 0x0, @private, @broadcast}, @redirect={0x5, 0x3, 0x0, @remote, {0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@lsrr={0x83, 0x3, 0x5b}, @timestamp_prespec={0x44, 0x1c, 0x22, 0x3, 0x1, [{@remote, 0x8}, {@loopback, 0x20002c}, {@empty, 0x400}]}, @ra={0x94, 0x4}, @generic={0x7, 0x6, "83dc61b1"}]}}, "1a11c6"}}}}}, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000000080), 0x1, 0x549, &(0x7f0000001800)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0x4a, &(0x7f00000000c0)=0x40, 0x4) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'syzkaller0\x00', 0x1}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4000054) 7m37.17312759s ago: executing program 1 (id=1601): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x30000c6, &(0x7f0000000080), 0x1, 0x553, &(0x7f0000001080)="$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") socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x6a040000) r1 = socket$inet6(0xa, 0x1, 0x84) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x4, 0x12011, r2, 0x0) getsockopt$bt_hci(r1, 0x84, 0x6d, &(0x7f0000002280)=""/4086, &(0x7f0000000040)=0xff6) r3 = open(&(0x7f0000000200)='./file1\x00', 0x14927e, 0x91) fallocate(r3, 0x11, 0x0, 0x8800000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x11a) pwritev2(r4, &(0x7f00000006c0)=[{&(0x7f0000000080)='7', 0x1}], 0x1, 0x6e45, 0x2, 0x0) sendfile(r4, r4, 0x0, 0xc19) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r2) 7m36.873247249s ago: executing program 1 (id=1607): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[], 0x7c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000002fc0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSETELEM={0x24, 0xc, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x4}]}], {0x14}}, 0x4c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) 7m36.213582308s ago: executing program 1 (id=1625): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x88c}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0xa9b, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write(r2, &(0x7f0000000200)="89", 0xffe3) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r4, 0x8912, &(0x7f0000001f00)) ioctl$VT_DISALLOCATE(r3, 0x5608) 7m36.213093818s ago: executing program 33 (id=1625): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x88c}}, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000100)=0xa9b, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) write(r2, &(0x7f0000000200)="89", 0xffe3) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPIOCGCHAN(r4, 0x8912, &(0x7f0000001f00)) ioctl$VT_DISALLOCATE(r3, 0x5608) 6m4.247421794s ago: executing program 2 (id=3292): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000fd0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x8, 0x12, r3, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x7) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x3200, 0x10001, 0x3, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28, 0x80}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=@newtfilter={0x4c, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r5, {0x6, 0x6}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x8, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0x4}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x10, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0xffffffff}]}]}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) 6m3.981309724s ago: executing program 2 (id=3305): syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffbbbb43ef452f40e786dd60418dda00102100fe880000000000000000000000000001fe8000000000000000000000000000aa000000000401907800ed5a2200a90000"], 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0f00000204000000080000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mknod(&(0x7f0000000240)='./file3\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc9ffb}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) utimensat(0xffffffffffffff9c, &(0x7f0000000340)='./file3\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x0, @perf_bp={0x0}, 0x1016c7, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000020000000000000f9ffff0b85000000ae000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = socket(0x1e, 0x4, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f0000000480), 0x4) sendmsg$tipc(r6, &(0x7f0000000200)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x810) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="4b00000009060102ffffeff9000000000000fffe0900020073797a3100000000050001000700000004000880"], 0x2c}, 0x1, 0x0, 0x0, 0x10000047}, 0x0) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f00000004c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x2a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x90) io_uring_setup(0x5116, &(0x7f0000000080)={0x0, 0x4a39, 0x80, 0x3, 0x246}) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000014c0)=ANY=[@ANYBLOB="a0010000100001000000000000000000fe8000000000000000000000000000bbff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000af0000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000170000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c001400636d61632861657329000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000"], 0x1a0}}, 0x0) 6m3.709290743s ago: executing program 2 (id=3309): r0 = socket(0x10, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x8}, 0x10) write(r0, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) pipe2(&(0x7f0000000140), 0x0) 6m3.666824633s ago: executing program 2 (id=3311): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000600000000000000008500000007000000c5000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0xe4}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESDEC=r1], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r3 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCSBRK(r3, 0x5427) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x10003, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f00000009c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0700000000000000b704000008000000850000009500889b313fb066e925361e3461c51df00c00ba9525cb468125d6dfd55b2744a2aa6d063cbf4c9a9117a9897295f1989e2d5e911a001a6ae8a7214d29e45d97347e3b2c1eddc16aa3a287b5efda55c4071067c73730661a4f6077a9075aa94b777688aac26755fb2ffe25243cf8c2c00ea5bd086b7ca327dd1ada1fbb7e465ada51899b617821728d275ffbba871d9306f517c022632f6d4885ad8461da463ba5c7cf68b5c91d527b3d4d11b5821b96c194da56ace718a68a2e595b907f651b5c9282d5085d69afdc"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000007000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5, 0x0, 0x200000000200}, 0x18) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000023c0)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@empty}, {@in6=@dev, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x3, 0x12}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 6m3.454315382s ago: executing program 2 (id=3318): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) syz_clone3(0x0, 0x0) syz_clone(0x0, 0x0, 0xfffffffffffffead, 0x0, 0x0, 0x0) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 6m3.383161002s ago: executing program 34 (id=3318): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) syz_clone3(0x0, 0x0) syz_clone(0x0, 0x0, 0xfffffffffffffead, 0x0, 0x0, 0x0) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.507403287s ago: executing program 4 (id=10729): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1}, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x2, 0x1, 0x13, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, 0x80, 0x8000, 0x1, 0x4}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffe17) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b000000000000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) getresgid(&(0x7f0000000c40), &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x10814, &(0x7f0000000700)=ANY=[@ANYBLOB='umask=00000000000000000000000,flush,nodots,dots,gid=', @ANYRESHEX=r11, @ANYBLOB="00006b746769643d0092", @ANYRESDEC, @ANYBLOB="1500bba7d41fabba4332de3ca642acf6f8de847e3f21783608008708a887d30aaf0a14b0691d48445fe3b4d1ddde1b81337b2c3b5f88535d7f6fa931b84783704494cebe49ca9f6269b05edde0246c360d0566b4056f0f02ccab035d3d0a5cde0b31bd424949fe23c0a0a25691738006c5c6acdf101fecdb4f79abdfb95c6afaea03dd5903b5240565f31504c207a9a2aa6c8108fb973081e90412a3c6cfa3b2513693727fad9acd8108acb8b90fab033c9dac0dc3e5a61c513e7b5edc5d76320f0e54045ea2b7b8fb1f78d3d346e26ee5ed6926cea1ffe0a1"], 0x1, 0x1fa, &(0x7f0000000500)="$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") sendmmsg$unix(r5, &(0x7f00000032c0)=[{{&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000540)="a8c4fe32cf571648754de49de0d4c9c75c1bdff463", 0x15}], 0x1, &(0x7f0000000a00)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r5, 0xffffffffffffffff, r8, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r8, 0xffffffffffffffff, r8, r2, r4, r9, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r8, r8, r2, r4, 0xffffffffffffffff, r4, r4, r9]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff, r2, 0xffffffffffffffff, r5]}}, @rights={{0x18, 0x1, 0x1, [r4, 0xffffffffffffffff]}}], 0x158, 0x40}}, {{&(0x7f0000000b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000c00)='-@L^', 0x4}, {&(0x7f0000000c40)="159f47d24fb78d0c3afe29b39c9de65fde3a1371d68a9359bf6375802049ad2defebb12715da2cfd772bf6ae96b088248430e20438be171a7bd3b1c7f4233f6382380b7f039bd36b202cde0ccee670340aca80e791590cc889c3c7f92a83403495666534826ab44ba5ab06e8543fec55158db809744f92749ef4552d3c6f0d199605c11ba05f73aa1e01816e01446a88917dd59697d70a1c7aed48a0a7b262d8e97bd6d7a1fb613420823f13a51a080f0b289d7f18f924659e3a1617304eab6cd6437a", 0xc3}, {&(0x7f0000000d40)="85d5ecf743d3d41626f29ea818c3d6e6fa3ac43dd942d71f9adf6919757cc5c01bb684e103565f51b7499e55c112b656b2022658f0f09862e66d37a06763e83da73fb658f6f3068e4a758de013ee00af4a61ab7cdf3784ce15bc059f6da4255805e355c567754438e558ac0092a35c0ededd170a910dd7ffbc55fbda9b20a63d5df80fde366b0884b2b8df1a4c43cdb2", 0x90}, {&(0x7f0000000e00)="19b924ab3d6df4e93fd825efe054a613a59965c29d22ba07461fd465d02b3a833dee8f6dca5ffe4f346abf8804923a4ffc0c3a529da5f3e9765a238690847d25d7eae8ef32a6569e178f9977d729b928256e3aa705f239cd4ca0af239dae74d1c6176f36abb29a656cf1b803623874c3873a35f99d849f2b6bcb58e47d0b68bb59ac669eea9f760753cdbb53b6be0a5f7ce0a95adcd05d3ee7153317570877cd1cecfc16207608b2c91c68abc92c29e325ae9d852b8f3e445b1a589160c658eda95acc05c568add3bc0274ae49b139815c5e8759c7a185628305daf200dc", 0xde}], 0x4, &(0x7f0000000f80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x20, 0x80}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000fc0)="098826baaf6fca11a6b96d35ae92cea36679eb", 0x13}], 0x1, &(0x7f0000001680)=ANY=[@ANYBLOB="1400000000000000c200000001140000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x000\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32=r9, @ANYRES32, @ANYRES32=r7, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYRES32=r6], 0x88, 0x45}}, {{&(0x7f0000001740)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001b40), 0x0, &(0x7f0000001dc0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78, 0x40000}}, {{&(0x7f0000001e40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0}}], 0x5, 0x10) r12 = io_uring_setup(0x243f, &(0x7f0000000200)={0x0, 0x0, 0x42, 0x3}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r12, 0xb, &(0x7f0000000300), 0x0) 2.377955686s ago: executing program 5 (id=10733): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000f100000005"], 0x48) socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x20000000, 0x20000000, 0x3, 0x7, 0x0, 0x40}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) r3 = socket(0x1, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r4, &(0x7f0000001500)="a45e140100000001000000c9b5edba60c570c394a0a6395b286cf81e81ca6fe684ada2b6d87bdfe04a5d1dd5bf5828aa35e9f0b7c65debf057d55e081b889c03452d3a46ec5bf447722aacc8a27faadfa00b423241364e67af2db5032c6dbc40b980d6d9ae496c9e866c9de23436ebbbe11a60b843136a370bcd635691381da6405fb56e8cf1468929055ec209222c927c3e3e6a09b3386f2a2e86b525a72671e3ae810a95854c0a2bef1ba81a74c323f97d9cc43fdc6c9320d80be5318da29220640e517ab574449ad3f016387ddf67b3fd91d5c57def77e34e82756e08e856", &(0x7f0000001380)=@udp=r3, 0x7}, 0x20) recvmsg(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001240)=""/113, 0x71}], 0x1}, 0x0) sendmmsg$unix(r3, &(0x7f0000001040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x54) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x18) 1.883248155s ago: executing program 6 (id=10742): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001240)=@mangle={'mangle\x00', 0x64, 0x6, 0x600, 0x390, 0x460, 0x1f0, 0x2c0, 0x1f0, 0x530, 0x530, 0x530, 0x530, 0x530, 0x6, 0x0, {[{{@ipv6={@mcast1, @private1, [], [], 'veth1\x00', 'veth1_vlan\x00'}, 0x0, 0x1c8, 0x1f0, 0x0, {0x0, 0x3a010000}, [@inet=@rpfilter={{0x28}, {0x4}}, @common=@inet=@recent0={{0xf8}, {0x6, 0x9, 0x2, 0x1, 'syz0\x00', 0x1}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x2c0}}, {{@ipv6={@empty, @mcast1, [0xff000000, 0xff000000, 0xff, 0xffffff00], [0xffffff00, 0xff000000, 0xffffff00, 0xffffffff], 'bond_slave_0\x00', 'wg1\x00', {}, {}, 0x87, 0x6, 0x0, 0x10}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@loopback, @mcast2, [0xffffffff, 0xff000000, 0xff000000, 0xff0000ff], [0xff, 0xff000000, 0xffffff00, 0xffffff00], 'lo\x00', 'veth0_vlan\x00', {0xff}, {0xff}, 0x16, 0x9f, 0x1, 0x51}, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@loopback, @private2, [], [], 'batadv0\x00', 'veth0_to_batadv\x00'}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x660) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x25dfdbfd, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 1.867139645s ago: executing program 6 (id=10743): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) r3 = shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8041, 0x0) write$binfmt_aout(r4, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000dc0)={0x0, 0x1, 0x0, 0x0, 0x9, "00629a7d82090100000000000000f7fffffb00"}) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x2000000000) r6 = dup3(r5, r4, 0x0) ioctl$TIOCSTI(r6, 0x402c542c, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0xe2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) r8 = syz_clone(0xa1000, &(0x7f0000000e00)="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", 0x1f9, &(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)="424624593c296362fe0cc43467b2bfe5adc3663810baa4a77dde4313b2885bb22f7d8d2aed0e3f9c44381d5a6023956c63795c2b2ace6869cb8a0625914e21a9163238c37afb0c66491ae336ffd8832266bac7f0bebb") newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r9, 0x0, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000540)="bf625e37771746efcf112a44b467a476108792f177ab3ff576ba352486f699a1287a873171f47c9851f2801261b907cdc3e11ebd5c7dadfd821ec9ec88e8b1d83522e1492fb4400299f938", 0x4b}, {&(0x7f0000000680)="76d1a04034ce328ab621d92829e34f22fae1e1e5a0bada80b801977c0af6f25a54b4b958fc3299abf0dfef20d3dc403c1c0d89464282dc96e39a019ca47fe5490736414f8dbdf6c1cac00c290d9cf922e95e6b3aa441cf38ec47051c9fa6a72b41e566149cea94beba778a66986223a4327a36dc744152e3448a6dd40414a8907eec93bbf2c7aec83781cfce053054b9acb7a440b465fd0d2c2d2b67012570a986710df1077c2ef049e2c36a056a87d6a91b5508b992088127563738501d583a9817396890cfcd9d2272a6b7e89f62099bd11c3a34a0ed6fd15ca35356aa", 0xde}, {&(0x7f0000000800)="0c6205de8c6bdec59c903a03fd0180510ec2a4f26364b314008e3ee17f954d07710ad2a57c051af77481ebc09d3b73d1af2505234b9fee3d70e38a1d3d2e9f729eb60b3650f7ec80c3f5f68e5dfd5bb4dd9588b7a57eb3e5f7c3a4b5e8da55a52d646746c2cbd5b7d199ba819f2fb7f4d8281cc9c77c4894de1840bb93f7db00822efee6e25fcdd076e787bf038fede2776c9ae3607e848431449c99bc8b01dbbed2b4f13f7f95bedd9de23023277810f546fcdd7b1d90f78a444ea5", 0xbc}], 0x3, &(0x7f0000000c40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r6, r5, r6]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r8, r9}}}], 0x70, 0x6000c001}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r6}, 0x4) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCVHANGUP(r10, 0x540f, 0x1000000000000) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000005c0)='kfree\x00', r11}, 0x18) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) shmctl$SHM_UNLOCK(r3, 0xc) 1.585533234s ago: executing program 4 (id=10744): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x3, &(0x7f0000000100)=[{0x5}, {0x45, 0x0, 0x0, 0xfffffffc}, {0x6}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a24000000000a01010000000000000009050000000900010073797a30000000000400060070000000030a01030000000000000000050000000900010073797a30000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000080001"], 0xd0}}, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000f) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000002300)) 1.466921124s ago: executing program 5 (id=10745): socket$inet_mptcp(0x2, 0x1, 0x106) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000002, 0x8031, 0xffffffffffffffff, 0xfffff000) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d00452a92307ff0ff0e97", 0xbd}], 0x1, 0x0, 0x0, 0x2663}, 0xc0) 1.239638633s ago: executing program 5 (id=10752): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x800000000000000}, 0x18) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x1d}}}]}, 0x50}, 0x1, 0x7}, 0x0) 1.198669613s ago: executing program 5 (id=10755): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000f100000005"], 0x48) socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x20000000, 0x20000000, 0x3, 0x7, 0x0, 0x40}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) r3 = socket(0x1, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r4, &(0x7f0000001500)="a45e140100000001000000c9b5edba60c570c394a0a6395b286cf81e81ca6fe684ada2b6d87bdfe04a5d1dd5bf5828aa35e9f0b7c65debf057d55e081b889c03452d3a46ec5bf447722aacc8a27faadfa00b423241364e67af2db5032c6dbc40b980d6d9ae496c9e866c9de23436ebbbe11a60b843136a370bcd635691381da6405fb56e8cf1468929055ec209222c927c3e3e6a09b3386f2a2e86b525a72671e3ae810a95854c0a2bef1ba81a74c323f97d9cc43fdc6c9320d80be5318da29220640e517ab574449ad3f016387ddf67b3fd91d5c57def77e34e82756e08e856", &(0x7f0000001380)=@udp=r3, 0x7}, 0x20) recvmsg(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001240)=""/113, 0x71}], 0x1}, 0x0) sendmmsg$unix(r3, &(0x7f0000001040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x54) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0}, 0x18) 1.054354182s ago: executing program 7 (id=10761): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001540)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, 0x0, {0xe, 0x5}, {}, {0x8, 0xffff}}}, 0x24}}, 0xc848) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x600, 0x0, 0x0, 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5, 0x0, 0x9135}, 0x18) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x3) unshare(0x2040400) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x2000400) fsmount(0xffffffffffffffff, 0x0, 0x1) 1.001839513s ago: executing program 0 (id=10762): perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000007}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x300, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x98000800}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)={0x34c, 0x37, 0x8, 0x70bd29, 0x25dfdbfd, {0x1b}, [@typed={0x8, 0xef, 0x0, 0x0, @u32=0xac}, @nested={0x18, 0xbb, 0x0, 0x1, [@typed={0x14, 0x4b, 0x0, 0x0, @ipv6=@mcast2}]}, @nested={0x63, 0xe2, 0x0, 0x1, [@generic="f93d78368a817d7d65b0ad08cb9f0da3039757133eb7bdf627f8f509c9672db33d5310958bc2c6da8ed4b8a075fa7434a0e32e42818879104ff1eae4da1888a09cb447f51ebbc5", @nested={0x4, 0x2a}, @nested={0x4, 0x3c}, @typed={0x8, 0x48, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0xda, 0x0, 0x0, @str='(}#\x00'}]}, @nested={0xfe, 0x77, 0x0, 0x1, [@typed={0x8, 0x131, 0x0, 0x0, @pid=r4}, @typed={0xe, 0xdb, 0x0, 0x0, @str='netdevsim\x00'}, @generic="a8784520a171924a30803ea7c64816bce83bcef7b80a7a36b2a2598b7d9323518633de6aed5b4823bbc2d82848fe1a418c50c15622089c14dd58e1c7eca1ef08877a573820dbe7330812587f70077d613684d7b466983aabdb0d7a624b21483455dcc2f7effd014f05a8111a8de841427ac2215b02a26161caf1488ae3249e7f9e1eb95fd83aec54da8049a74cb366d4aaec47c4bf674aeb04ce1e7eeff2d0f84142d8f74bc301e352c27b6d2bd3ee7cd46998945867fc74add86bbbe336a2fdc3ca015b98ae593740c9", @generic="1608ece6723358d313bdf62ce2d8c009", @nested={0x4, 0x83}, @nested={0x4, 0x100}]}, @typed={0xc, 0x138, 0x0, 0x0, @u64=0x9}, @nested={0x10, 0x65, 0x0, 0x1, [@typed={0x8, 0x5c, 0x0, 0x0, @pid=r5}, @nested={0x4, 0xa3}]}, @nested={0x195, 0x149, 0x0, 0x1, [@generic="c5bcca57a880431fd96941fdf1e0f26c546fc1c0779c7afe311345714df73a2d83534c647182523f156e41ead6", @typed={0x4, 0x1a}, @generic="1228cc2350d74bf49e6a7a8475c06bdb9a2fe4b1031cd2dc4e5f144074788253d9ee4cc885dbe8c06216862c66fe38d30ac47fe8f70d8596add16a085d1122512a3103f7949ed1f87d11c885f8b33d2f35390b477154214757bacd9984499c666f2a155fc7225cb2005ddf23b31d358f5d54f2a762c2668bb3c6a186f6992e37679e67359bf6", @generic="68b98d6ba173d4b2ea01727d442f042c26702febc6c34b4107f1ecd82be368bc524854205472b54d2e040a2ae79d86f99631bd5c369e0ab9eefd6694587aa0fdefba30a1edb5845d9b1eac628f0bbd2f4852f7399ec79959388cf6e0530ba81cb9a6f75b5b2e353309253b5dc79a2425abcb9301653b5c6186d2b819996f9e7e004947402cece4d6d47fef2bedeb284c7f32672665c9f255f167058ceb4fdaeea7df8447f2d9b9d8b1a3b360c087c4cddd79d14eaf328eb0ccbc6ee6f85c8b3fbfecf8f09f549d144b8d0599f6ff9ceac59baba99733dc4def99"]}]}, 0x34c}, 0x1, 0x0, 0x0, 0x20040804}, 0x40810) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[], 0x78}, 0x1, 0x0, 0x0, 0x4000}, 0x24008040) socket$can_raw(0x1d, 0x3, 0x1) 954.204303ms ago: executing program 0 (id=10766): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r1, 0x0, 0x800000000000000}, 0x18) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x3, 0x0, 0x3, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local={0xac, 0x14, 0x1d}}}]}, 0x50}, 0x1, 0x7}, 0x0) 888.398692ms ago: executing program 6 (id=10767): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES64=r0, @ANYRES32=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1}, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x2f, 0x6, 0x2, 0x1, 0x13, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, 0x80, 0x8000, 0x1, 0x4}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffe17) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0}) socket$kcm(0xa, 0x1, 0x106) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sched_getaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000180)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x18) r4 = syz_io_uring_setup(0x83f, &(0x7f00000000c0)={0x0, 0xa9ee, 0x400, 0x2, 0x8002ae}, &(0x7f00000005c0)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x109880}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0xfffffdcf) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xf}}}, 0x24}}, 0x0) 887.820622ms ago: executing program 6 (id=10769): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x300001a, &(0x7f0000001fc0)=ANY=[], 0x0, 0x2b6, &(0x7f0000000800)="$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") chdir(&(0x7f0000000540)='./file0\x00') r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000240)={0x1, 0x17, 0x300, 0x0, 0x0, 0x2, 0x0}) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x6800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100000002) 835.207202ms ago: executing program 6 (id=10770): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x9360, 0xffffffff, 0x3, 0x5, 0x4, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/139, 0x8b}, {0x0}], 0x2) sendmmsg$unix(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1, 0x0, 0x0, 0x28040000}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="20000000000000000100040001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001"], 0xa0, 0x4054}}], 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r4, 0x0, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x404c844, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r7, 0x0) write$cgroup_devices(r6, 0x0, 0xffdd) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="3c000000100001000000000000000000f6427784", @ANYRES32=r3, @ANYBLOB="84110000040000001c0012800b0001006d616373656300000c000280050003000e"], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) (fail_nth: 2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 543.205581ms ago: executing program 4 (id=10771): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x513, &(0x7f0000000c40)="$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") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)=@setneightbl={0x1c, 0x43, 0x1, 0x70bd28, 0x25dfdbfd, {0x2}, [@NDTA_NAME={0x8, 0x1, 'func'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) r0 = socket(0x10, 0x80003, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000180)=@add_del={0x2, 0x0}) write(r0, 0x0, 0x0) recvmsg$unix(r0, 0x0, 0x0) unshare(0x20000400) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r1, &(0x7f0000000a80)="962449f937da0f33bcbb5face5a18603215a3e30aae93fc8712711195195a3b3ebe14a09e6f413bcb547dc6a9418b1a13fdc0f23f68e3240bd188ef9392051e0705be229c03a4171a5dd35c7a27aee02b072b3a96d5fbb28f35e9e5c510299b7c0812e958cc117541ca7eb05514a02a9af98c0c21c877b2a0f19e387e76bbc98dd3fa6c0d82b8f66e824ed6f14a2950195b0d5c7139a5f80c1bf229bf680a6cf3f95b41ab0a09ddc42e1bfd5b6b23954bd8718ed09c890e39f02cdac063a53ef8a431e77b9036b93af490253dd3fe20ff75b8f1d3b6c009fcca12bd60dc97d77", &(0x7f0000000b80)=""/189}, 0x20) 542.805891ms ago: executing program 7 (id=10772): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48801}, 0x0) 386.600181ms ago: executing program 7 (id=10773): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000ea00000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00f9000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a320000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a31000000004c000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d6163767461700000000800014000000005"], 0xe8}}, 0x0) 140.82802ms ago: executing program 4 (id=10774): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001540)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, 0x0, {0xe, 0x5}, {}, {0x8, 0xffff}}}, 0x24}}, 0xc848) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x600, 0x0, 0x0, 0x0}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5, 0x0, 0x9135}, 0x18) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000240)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x3) unshare(0x2040400) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) unshare(0x2000400) fsmount(0xffffffffffffffff, 0x0, 0x1) 140.51991ms ago: executing program 7 (id=10775): syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x2810800, &(0x7f0000000400)=ANY=[@ANYBLOB="0001845b54791dc12769777c592cbef2155de49528183964795966db279e80bf1d2f30667e8c2d55dfe71c0ded7eb3033820d875fc1dc497b2b4c8e662d1d7790dcd5a854affefc8f120f9e8a9fd56f56862d0dbb57756a4b05eb5e15f724d2054e8e9b276ead72463b9043bca393d1ee32c62b93d64b560fcf8a089a9a79ed4ffccfd1301c03461f43423d4703446b3d5f1a66985614602d98304c000f517665985707e09610209613e57d2434727b016b946c79ddce0aacd0f1638a22729e2c7bf2777c097e4cefac3620b0aa49779baeb3ba2966e053f5c92b02f33cb42d3cb37c1089ab6d93c17c67c322e38287db1f2247f438d6c11abe281828546acddf5"], 0x25, 0x336, &(0x7f0000004200)="$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") creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) mount$bind(0x0, &(0x7f0000000140)='.\x00', 0x0, 0x825, 0x0) (fail_nth: 2) 122.43993ms ago: executing program 7 (id=10776): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x6, 0xd, &(0x7f00000008c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0, @ANYRES32=r0], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000400)={[{@sysvgroups}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x4000}}]}, 0xff, 0x23f, &(0x7f0000000540)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r5, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r6 = creat(&(0x7f00000002c0)='./file0\x00', 0x21) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=[0x7, 0x7], &(0x7f0000000500)=[0x2], 0x0, 0x100000}}, 0x3c) sendmmsg$inet(r3, &(0x7f0000000940)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000000000000000000000718592e"], 0x10}}], 0x1, 0x0) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) r10 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000010140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000002400)=ANY=[@ANYBLOB="02000000010007000000000002000600", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="020001ffa4d24f0ba0089e405354ff4062eccbf0fb7255a379a936ac17c68a1da05ded7cefdbb1eefee73b3e4e9744c7b0ec9169860e4857a1be52ca2d93b64ae4ae25cf677937ff6effb60ef42f3003eb1bb49e5207d22cc642dc127de80108d02d560880a7b9167c34b686500b8dec0122a15edcd803d4db435015f604ea12b3867c3eec3cf2441a76a8c9bfa471a0d399f41f", @ANYRES32, @ANYBLOB="8a0adc4d6e6e51ae793040", @ANYRES32, @ANYBLOB, @ANYBLOB], 0x54, 0x1) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r11, &(0x7f0000000000)='map_files\x00') statx(r4, &(0x7f0000002700)='./mnt\x00', 0x800, 0x100, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x0, &(0x7f0000002840)) syz_clone(0x2008080, &(0x7f0000002880)="64db733941211137e78be940a9c5358e88d973933737fe6ec0546b0cd37717900cf31c16f5475eef0d5a6395c27d0358e197e9693c98983921a1e6459b2c26792b75a14ac1b2ba1fe7e268a1b547a306ecb3615d15f2e859501f27d7434e8544c352495dea1afab516a51f91a83f7c90808beca9535d59d6b91f74fd3b4b07b008db8ad27166e7e46da3a52891d9cb6b9071bf5fc8a44db6489b4b", 0x9b, &(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)="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") r13 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@private2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000380)=0xe8) sendmsg$nl_xfrm(r13, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=@delpolicy={0x50, 0x14, 0x400, 0x70bd28, 0x25dfdbfe, {{@in6=@dev={0xfe, 0x80, '\x00', 0x26}, @in=@local, 0x4e22, 0x0, 0x4e23, 0x80, 0xa, 0x100, 0xe0, 0x87, 0x0, r14}, 0x6e6bbd}}, 0x50}, 0x1, 0x0, 0x0, 0x51}, 0x4004011) getresgid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)=0x0) sendmmsg$unix(r10, &(0x7f0000003bc0)=[{{&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000440)="29b5fe681c275a71f9680ec85c0b9262b0e338fd1823ade82a9e329f57e50b4ae6601288a203d382a6a91395f9ed2f1e5fc3020ee407657073e6f676a7a6cca7ea7b1bab68", 0x45}, {&(0x7f0000000ac0)="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", 0x1000}], 0x2, &(0x7f0000000800)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000358c440d01008786a01bf7b31aee7f4c11d34138ab000001000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r9, @ANYRES32=r5, @ANYRES32=r10, @ANYRES32=r2, @ANYRES32, @ANYRES32=r3], 0x70, 0x20000800}}, {{&(0x7f0000001b40)=@file={0x1, '.\x00'}, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000001bc0)="1e34836f2602f7ce3e38c515c1abf1a596d6ae35b0a20834142cce1520b087788f364e62d15db2f9f62ddb0a5b2e87979103f588e5450216accdb21c1d1525026bb7a2c131094cb4ed087a78055878c25823c816122d2d5211ad9e5009c1241dc452aeb1185b5a33566cb1ac4f1db2182f19c7bc0efcdedc1c70fcdcee33db7aefdadd81376ff5c8", 0x88}, {&(0x7f0000000a00)="c74b1aa5372b8191", 0x8}, {&(0x7f0000001c80)="0d92ac67ecf910a2996e6e4508bd0f3a6177ae3b9d2f57fa4398100a12abac84e46b41df6bd38724900c4440f1e8c18ec999fe22db55ee3c88ed7b7314dc3bc0802969", 0x43}, {&(0x7f0000001d00)="c813eec6569bf2885ffc912505d6329b8607fe4da721a20ffe663e573389cac9db0ac9d727ffca615f44c899f7623c33b7bb4231f1faaef73521ad36f6021a3231e48ce1a1b3581090754f10c19443e7a6785d69af07c1531842d0487704e1ffc779e74b6e72785796831076ac1a7903da8316fb1209bf6fe39efe17088bb1106ad9f4b86bbfa5a54a5f0f31c0cbcb4246d5907fa9ecde516925ca27010d909d4833e7f97f7a04c370468d4a2f3a5529c378e2c826", 0xb5}, {&(0x7f0000001dc0)="5b966ff27140a80af84875cd0c57", 0xe}, {&(0x7f0000001e00)="8848a996b11cc82304a36aa0f526da02cde2ad2193600713e1945ff26ebeefca2034583fdf2822146369b9cc1317f8154cdca5fd74079a0bb0a6c55a057fed55913030ebc39d576cc99d442d09da9d62f50aa20c1054be280cdcd5a709d7e8ac2d30285c716d77ecdf15706443529dc4a226f45c9b04a57502e70dc99307bf703fdc53e06cd8d1b250b96477351aacd2ed204ddc0819fe0e8e4e7350a3449ef8f908ef9d6d11c629c247c4f6339e6dcf1ff80ad211a5068d5f0b342f9579e572da6c3c4fcea173bb5c7f8b8f19f556475293245d8ee0ecf3cd4e1fb5f74fafae1b1ec055dd18ebcb", 0xe8}, {&(0x7f0000001f00)="fc7502ea09735d3a18e157733fe87b4e7fc84aad18a74b5cfbecb8ae62710acdf1d56e667615da5a5734022589482168bd4ea73e365c00391ad240b024c6fac479ba2bcdeca8fc51c93cbb1756f0dd5993aa944f670b154e23053b53b5b0e8d247ec9aec306223dc97d8bdaefa06370c8936c6e9d8c36db8de", 0x79}, {&(0x7f0000002280)="b96ba4ece0b9b5836d90997208c744f49c7cec59b1562c132b8d3b241737f1f3e2fdf06380de704380f06846e56a21a1e4a1170fff6abe79a9631225240ea49f050cdbf595f2b2420537513c796837edd1f39a6ec3c194feb197b8f06c0f445dc2cf91fd2fde8dae071f11633f6a00d357483d213fe72a86cc966355b9a17687645136fd27774a67f27f6496c436dcdf65b21b39ec74cc986d1ae90a5591e431f656e38e583f382d4b16bf", 0xab}, {&(0x7f0000002040)="fd23875629758d977ab8c586479a25237648fb1ac7ca549ba0106400840246ab6f88e30cbf793e7d7e9c1479f32c8b1f667f8f39b804e10fb8f0e6d7fe878fcc0f339b2a7ef4299a358274790cb98db3a1e1b29e70d701b011c9b7ba718f4c3eb0548d4dca975b9ea97fa3a1e9d95131e959580536b96dc94f4160073339981fd1fca489c34b6800cbc5d5b021540a82c18e6a82e54419da08206fb4061e3678cdccabe1e283ff6cdb5f7035", 0xac}, {&(0x7f0000002100)="e6df24cde664ffb2155e58a0d78c148c71b4ba60aadc5a91379dfdeee373f1cf173cb32310acb5565994fd73ece4405dd29f8415b2c487a16b154361fa6e0103d6fc06a2ac76126d8ae29cb86624bc1bfb987290028b1323d125aa08b8520f218920b87f07e1b88f83eec10b59aaa529050f6a15493a7dc2a34b4f2c82c0d9df5e973a58ae85bbee4167871071b40b0de292a6670b8738cc2bbcd0983133f973487a72a4a5f870ca9801ac984f", 0xad}], 0xa, &(0x7f0000003a80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r6]}}, @rights={{0x30, 0x1, 0x1, [r9, r1, r8, r1, r6, 0xffffffffffffffff, r7, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r11, r14, r15}}}], 0x128, 0x4000080}}], 0x2, 0x4004094) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r16, @ANYBLOB=',wfdno=', @ANYRESHEX=r17, @ANYBLOB=',version=9p2000.d,\x00']) 105.66448ms ago: executing program 5 (id=10777): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24532a0856225ab8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) statx(0xffffffffffffffff, 0x0, 0x60000000000000, 0x40, 0x0) 49.79583ms ago: executing program 4 (id=10778): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x9360, 0xffffffff, 0x3, 0x5, 0x4, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/139, 0x8b}, {0x0}], 0x2) sendmmsg$unix(r1, &(0x7f0000002ec0)=[{{0x0, 0x0, &(0x7f0000001580)=[{0x0}], 0x1, 0x0, 0x0, 0x28040000}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="20000000000000000100040001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001"], 0xa0, 0x4054}}], 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r4, 0x0, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x404c844, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r7, 0x0) write$cgroup_devices(r6, 0x0, 0xffdd) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="3c000000100001000000000000000000f6427784", @ANYRES32=r3, @ANYBLOB="84110000040000001c0012800b0001006d616373656300000c000280050003000e"], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 49.47094ms ago: executing program 5 (id=10779): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) r3 = shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8041, 0x0) write$binfmt_aout(r4, &(0x7f0000000080)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000dc0)={0x0, 0x1, 0x0, 0x0, 0x9, "00629a7d82090100000000000000f7fffffb00"}) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0x2000000000) r6 = dup3(r5, r4, 0x0) ioctl$TIOCSTI(r6, 0x402c542c, &(0x7f0000000000)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0xe2) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) r8 = syz_clone(0xa1000, &(0x7f0000000e00)="34c82fb742a5262b8b0627945e19d1ad5fb82df585180e2444d194c8b69e695af5f4f901104e5712ae57fe0296d692edbad505b77cff4bd96c1cc92870c5eb63966eba0e5c08917dafff3ff45a7fca591cd4a0b36cb7dfb2f4a122ed21299b29a647f364def20f0194d1d2826d893e7b9c1635052a81ee9d4e9b2af8bbe9274cd7fe4012bfd9215dfd08c5ad0bbe874ffcbe69f9850de549aeaeb45fe4a738ffbdf748079188aa2cf78ba835a8b997eac925778281ddb989414c77c08c3b336be7b6f7c3cf91b745ba2541778361ba5dfa4eacfdc59724ce0cb4aa0da922f16773c329fdffffffffffffff9477b6b4862505a29ec4090dc35e3bbd8eabac7cdd6da6096b5bb67603c643a761738d769b0c0f30c16ddf6dadc3618a95fb1ef8a734ced76335c21369e4621234423ad817f8712026cd6f16c6d8a88304723f40919b1ab6294a8fb57b1f56829e8587d0c1e41348a0a2bda91ecb6d75e32420d8f835f96be94df90b8521931837fceb6ad9f642b05ca6acffbf3efab122129afacfca45befcd9f8a0b65fd11c865c4007eb8ff0564b94ef2e160901ac14d2b400a4e6f1d8a6207554aacf67b0cf6452aa14274c46b3de61cda32f3a51ca4a4aef50feb41bdbb2fd41e6e0811fece9826d670dc3cdadaf73812b9b51e5ef244412a5ec908a669b4dc2ba519e0e0e4745478c1737b2b33a247af348", 0x1f9, &(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)="424624593c296362fe0cc43467b2bfe5adc3663810baa4a77dde4313b2885bb22f7d8d2aed0e3f9c44381d5a6023956c63795c2b2ace6869cb8a0625914e21a9163238c37afb0c66491ae336ffd8832266bac7f0bebb") newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r9, 0x0, 0xffffffffffffffff) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000004c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000540)="bf625e37771746efcf112a44b467a476108792f177ab3ff576ba352486f699a1287a873171f47c9851f2801261b907cdc3e11ebd5c7dadfd821ec9ec88e8b1d83522e1492fb4400299f938", 0x4b}, {&(0x7f0000000680)="76d1a04034ce328ab621d92829e34f22fae1e1e5a0bada80b801977c0af6f25a54b4b958fc3299abf0dfef20d3dc403c1c0d89464282dc96e39a019ca47fe5490736414f8dbdf6c1cac00c290d9cf922e95e6b3aa441cf38ec47051c9fa6a72b41e566149cea94beba778a66986223a4327a36dc744152e3448a6dd40414a8907eec93bbf2c7aec83781cfce053054b9acb7a440b465fd0d2c2d2b67012570a986710df1077c2ef049e2c36a056a87d6a91b5508b992088127563738501d583a9817396890cfcd9d2272a6b7e89f62099bd11c3a34a0ed6fd15ca35356aa", 0xde}, {&(0x7f0000000800)="0c6205de8c6bdec59c903a03fd0180510ec2a4f26364b314008e3ee17f954d07710ad2a57c051af77481ebc09d3b73d1af2505234b9fee3d70e38a1d3d2e9f729eb60b3650f7ec80c3f5f68e5dfd5bb4dd9588b7a57eb3e5f7c3a4b5e8da55a52d646746c2cbd5b7d199ba819f2fb7f4d8281cc9c77c4894de1840bb93f7db00822efee6e25fcdd076e787bf038fede2776c9ae3607e848431449c99bc8b01dbbed2b4f13f7f95bedd9de23023277810f546fcdd7b1d90f78a444ea5", 0xbc}], 0x3, &(0x7f0000000c40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r6, r5, r6]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r8, r9}}}], 0x70, 0x6000c001}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r6}, 0x4) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCVHANGUP(r10, 0x540f, 0x1000000000000) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000005c0)='kfree\x00', r11}, 0x18) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) shmctl$SHM_UNLOCK(r3, 0xc) 21.18662ms ago: executing program 6 (id=10780): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./file0\x00', 0x300001a, &(0x7f0000001fc0)=ANY=[], 0x0, 0x2b6, &(0x7f0000000800)="$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") chdir(&(0x7f0000000540)='./file0\x00') r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000240)={0x1, 0x17, 0x300, 0x0, 0x0, 0x2, 0x0}) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x6800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180), 0xfea7) socket$rxrpc(0x21, 0x2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0x100000002) 0s ago: executing program 0 (id=10781): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1c) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="8500000085890000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='cachefiles_io_error\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = memfd_secret(0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setlease(r3, 0x400, 0x0) close(r3) kernel console output (not intermixed with test programs): z-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 491.847190][ T29] audit: type=1326 audit(2000262830.115:31620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.4.9319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 491.870834][ T29] audit: type=1326 audit(2000262830.115:31621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.4.9319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 491.894446][ T29] audit: type=1326 audit(2000262830.115:31622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.4.9319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 491.918151][ T29] audit: type=1326 audit(2000262830.115:31623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.4.9319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 491.998600][ T29] audit: type=1326 audit(2000262830.274:31624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28218 comm="syz.4.9319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 492.056889][T28236] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9326'. [ 492.085301][T28236] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9326'. [ 492.105892][T28240] netlink: 76 bytes leftover after parsing attributes in process `syz.7.9328'. [ 492.147008][T28248] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 492.324645][T28269] tmpfs: Bad value for 'mpol' [ 492.641472][T28289] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 493.145847][T28317] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 493.277972][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 493.474661][T28360] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 494.211611][T28378] Invalid ELF header magic: != ELF [ 494.498859][T28398] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 494.512666][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 494.713459][T28434] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 495.420062][T28474] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 495.688773][T28503] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 495.765584][T28516] __nla_validate_parse: 9 callbacks suppressed [ 495.765631][T28516] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9430'. [ 495.932701][T28544] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9443'. [ 496.099611][T28552] IPv6: Can't replace route, no match found [ 496.275485][T28578] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9457'. [ 496.440999][T28600] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9468'. [ 496.473445][T28602] 9pnet: Could not find request transport: t [ 496.674671][T28635] netlink: 24 bytes leftover after parsing attributes in process `syz.4.9478'. [ 496.691414][T28635] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9478'. [ 496.849637][T28646] Invalid ELF header magic: != ELF [ 497.134715][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 497.317054][T28673] IPv6: Can't replace route, no match found [ 497.442036][T28680] netlink: 24 bytes leftover after parsing attributes in process `syz.0.9490'. [ 497.461945][T28680] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9490'. [ 497.547526][ T29] kauditd_printk_skb: 228 callbacks suppressed [ 497.547545][ T29] audit: type=1326 audit(2000262835.512:31853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28687 comm="syz.0.9494" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6d0d169 code=0x0 [ 497.650230][T28696] 9pnet: Could not find request transport: tc [ 497.700930][T28709] netlink: 24 bytes leftover after parsing attributes in process `syz.7.9503'. [ 497.711636][ T29] audit: type=1326 audit(2000262835.671:31854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.735260][ T29] audit: type=1326 audit(2000262835.671:31855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.758886][ T29] audit: type=1326 audit(2000262835.671:31856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.782541][ T29] audit: type=1326 audit(2000262835.671:31857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.822753][ T29] audit: type=1326 audit(2000262835.671:31858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.846570][ T29] audit: type=1326 audit(2000262835.671:31859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.870214][ T29] audit: type=1326 audit(2000262835.718:31860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.893832][ T29] audit: type=1326 audit(2000262835.718:31861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.917497][ T29] audit: type=1326 audit(2000262835.718:31862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28706 comm="syz.6.9502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 497.945095][T28715] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 497.957405][T28709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9503'. [ 498.149627][T28741] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 498.385136][T28766] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 498.482394][T28778] IPv6: Can't replace route, no match found [ 498.598290][T28795] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 498.730744][T28808] IPv6: Can't replace route, no match found [ 498.896337][T28825] Invalid ELF header magic: != ELF [ 498.914459][T28826] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 500.110085][T28844] IPv6: Can't replace route, no match found [ 500.398428][T28869] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 500.997837][T28903] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 501.316586][T28930] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 501.428092][T28950] Invalid ELF header magic: != ELF [ 501.855055][T28967] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 502.373329][T28993] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 502.636908][T29002] __nla_validate_parse: 12 callbacks suppressed [ 502.636928][T29002] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9627'. [ 502.652212][T29002] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9627'. [ 502.661301][T29002] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9627'. [ 503.675120][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 503.675137][ T29] audit: type=1326 audit(2000262841.246:31945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.725289][ T29] audit: type=1326 audit(2000262841.274:31946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.748973][ T29] audit: type=1326 audit(2000262841.274:31947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.772615][ T29] audit: type=1326 audit(2000262841.274:31948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.796508][ T29] audit: type=1326 audit(2000262841.274:31949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.820152][ T29] audit: type=1326 audit(2000262841.283:31950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.843802][ T29] audit: type=1326 audit(2000262841.283:31951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.868184][ T29] audit: type=1326 audit(2000262841.283:31952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.891909][ T29] audit: type=1326 audit(2000262841.293:31953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.915523][ T29] audit: type=1326 audit(2000262841.293:31954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29007 comm="syz.4.9634" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f038b03d169 code=0x7ffc0000 [ 503.952572][T29024] Invalid ELF header magic: != ELF [ 503.988443][T29018] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 504.080586][T29035] netlink: 32 bytes leftover after parsing attributes in process `syz.4.9640'. [ 505.210557][T29068] dccp_invalid_packet: P.Data Offset(172) too large [ 505.666148][T29085] netlink: 32 bytes leftover after parsing attributes in process `syz.0.9658'. [ 505.871155][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 506.352474][T29115] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9672'. [ 506.361449][T29115] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9672'. [ 506.370421][T29115] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9672'. [ 506.953477][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 507.157299][T29154] netlink: 32 bytes leftover after parsing attributes in process `syz.4.9688'. [ 507.627075][T29183] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9698'. [ 508.745014][T29185] __nla_validate_parse: 2 callbacks suppressed [ 508.745030][T29185] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9701'. [ 508.760148][T29185] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9701'. [ 508.809878][T29185] netlink: 4 bytes leftover after parsing attributes in process `syz.6.9701'. [ 509.280896][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 509.280988][ T29] audit: type=1326 audit(2000262846.493:32049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29214 comm="syz.5.9716" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fcfa813d169 code=0x0 [ 509.424890][T29230] netlink: 24 bytes leftover after parsing attributes in process `syz.5.9716'. [ 509.435677][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 509.658219][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 509.773559][T29265] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 510.239531][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 510.266334][T29287] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 510.325222][ T29] audit: type=1326 audit(2000262847.457:32050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.348960][ T29] audit: type=1326 audit(2000262847.457:32051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.373139][ T29] audit: type=1326 audit(2000262847.457:32052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.396842][ T29] audit: type=1326 audit(2000262847.457:32053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.420836][ T29] audit: type=1326 audit(2000262847.457:32054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.444478][ T29] audit: type=1326 audit(2000262847.466:32055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.468226][ T29] audit: type=1326 audit(2000262847.466:32056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.491919][ T29] audit: type=1326 audit(2000262847.466:32057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.515564][ T29] audit: type=1326 audit(2000262847.466:32058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29291 comm="syz.7.9753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 510.576562][T29302] netlink: 24 bytes leftover after parsing attributes in process `syz.7.9754'. [ 510.647623][T29304] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9754'. [ 510.779350][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 510.840476][T29324] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9760'. [ 511.143037][T29336] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9770'. [ 511.152066][T29336] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9770'. [ 511.161481][T29336] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9770'. [ 511.653478][ T50] batadv1: left allmulticast mode [ 511.658662][ T50] batadv1: left promiscuous mode [ 511.663969][ T50] bridge0: port 3(batadv1) entered disabled state [ 511.673328][ T50] bridge_slave_1: left allmulticast mode [ 511.679011][ T50] bridge_slave_1: left promiscuous mode [ 511.684917][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.693251][ T50] bridge_slave_0: left allmulticast mode [ 511.699018][ T50] bridge_slave_0: left promiscuous mode [ 511.704704][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.809828][ T50]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 511.885914][ T50]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 511.895608][ T50]  (unregistering): Released all slaves [ 511.904182][ T50] bond0 (unregistering): Released all slaves [ 511.971954][ T50] tipc: Left network mode [ 512.022218][ T50] hsr_slave_0: left promiscuous mode [ 512.028090][ T50] hsr_slave_1: left promiscuous mode [ 512.035919][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 512.043620][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 512.068535][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 512.076328][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 512.087483][ T50] veth1_vlan: left promiscuous mode [ 512.096612][ T50] veth0_vlan: left promiscuous mode [ 512.578372][T29441] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 512.741944][T29465] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 512.906227][T29469] IPv6: Can't replace route, no match found [ 513.294974][T29498] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 513.432638][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 513.506647][T29525] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 513.551547][T29533] Invalid ELF header magic: != ELF [ 513.632447][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 513.713310][T29556] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 513.857813][T29580] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 513.993753][T29604] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 514.149740][T29632] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 514.505158][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 514.595171][T29685] Invalid ELF header magic: != ELF [ 514.653975][T29678] IPv6: Can't replace route, no match found [ 515.272074][T29692] xt_check_target: 1 callbacks suppressed [ 515.272143][T29692] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 515.656037][T29739] IPv6: Can't replace route, no match found [ 515.740781][T29751] Invalid ELF header magic: != ELF [ 516.342298][T29757] lo speed is unknown, defaulting to 1000 [ 516.398705][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 516.576745][T29757] chnl_net:caif_netlink_parms(): no params data found [ 516.592770][T29785] 9pnet: p9_errstr2errno: server reported unknown error @í΂Í( [ 516.693279][T29757] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.700476][T29757] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.723277][T29757] bridge_slave_0: entered allmulticast mode [ 516.730306][T29757] bridge_slave_0: entered promiscuous mode [ 516.737662][T29757] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.744858][T29757] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.752158][T29757] bridge_slave_1: entered allmulticast mode [ 516.759100][T29757] bridge_slave_1: entered promiscuous mode [ 516.787149][T29757] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 516.802013][T29757] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 516.830275][T29757] team0: Port device team_slave_0 added [ 516.841224][T29757] team0: Port device team_slave_1 added [ 516.862914][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 516.870824][T29757] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 516.877805][T29757] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.903889][T29757] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 516.916828][T29757] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 516.924036][T29757] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 516.950110][T29757] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 516.985251][T29757] hsr_slave_0: entered promiscuous mode [ 516.991458][T29757] hsr_slave_1: entered promiscuous mode [ 517.001958][T29757] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 517.009652][T29757] Cannot create hsr debugfs directory [ 517.015227][T29810] __nla_validate_parse: 1 callbacks suppressed [ 517.015240][T29810] netlink: 76 bytes leftover after parsing attributes in process `syz.0.9980'. [ 517.141221][T29817] lo speed is unknown, defaulting to 1000 [ 517.178716][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 517.178747][ T29] audit: type=1400 audit(2000262853.883:32136): avc: denied { relabelfrom } for pid=29816 comm="syz.0.9983" name="" dev="pipefs" ino=102679 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 517.207798][T29820] SELinux: Context system_u:object_r:dhcp_state_t:s0 is not valid (left unmapped). [ 517.229802][ T29] audit: type=1400 audit(2000262853.920:32137): avc: denied { relabelto } for pid=29816 comm="syz.0.9983" name="" dev="pipefs" ino=102679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:dhcp_state_t:s0" [ 517.313138][ T29] audit: type=1400 audit(2000262854.005:32138): avc: denied { read } for pid=29824 comm="syz.6.9986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 517.352509][T29825] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=102 sclass=netlink_xfrm_socket pid=29825 comm=syz.6.9986 [ 517.420967][T29835] netlink: 76 bytes leftover after parsing attributes in process `syz.0.9991'. [ 517.501636][T29757] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 517.533448][T29757] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 517.545655][T29757] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 517.558220][T29757] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 517.603416][T29757] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.610600][T29757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.617997][T29757] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.625077][T29757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.654041][T29848] netlink: 68 bytes leftover after parsing attributes in process `syz.0.9995'. [ 517.667588][ T68] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.697861][ T68] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.861910][T29757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 517.977172][T29757] 8021q: adding VLAN 0 to HW filter on device team0 [ 518.011960][ T8905] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.019050][ T8905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.031437][ T68] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.038566][ T68] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.113720][T29757] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 518.143408][T29859] netlink: 76 bytes leftover after parsing attributes in process `syz.7.10001'. [ 518.157895][T29851] IPv6: Can't replace route, no match found [ 518.254179][T29757] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 518.450919][T29757] veth0_vlan: entered promiscuous mode [ 518.461236][T29902] netlink: 76 bytes leftover after parsing attributes in process `syz.6.10012'. [ 518.472408][T29757] veth1_vlan: entered promiscuous mode [ 518.500230][T29757] veth0_macvtap: entered promiscuous mode [ 518.521428][T29757] veth1_macvtap: entered promiscuous mode [ 518.560554][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.571165][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.581074][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.591674][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.601594][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.612188][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.622145][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 518.632611][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.657857][T29757] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 518.674192][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.684707][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.694765][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.705227][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.715075][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.725600][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.735546][T29757] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 518.746006][T29757] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 518.762730][T29757] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 518.774738][T29757] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.783574][T29757] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.792342][T29757] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.801159][T29757] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 518.875433][ T29] audit: type=1400 audit(2000262855.445:32139): avc: denied { write } for pid=29757 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=396 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 518.902599][ T29] audit: type=1400 audit(2000262855.445:32140): avc: denied { open } for pid=29757 comm="syz-executor" path="/syzcgroup/cpu/syz5/cgroup.procs" dev="cgroup" ino=396 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:net_conf_t:s0" [ 519.333623][T29932] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 519.419201][T29945] FAULT_INJECTION: forcing a failure. [ 519.419201][T29945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.432386][T29945] CPU: 1 UID: 0 PID: 29945 Comm: syz.7.10029 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 519.432419][T29945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 519.432435][T29945] Call Trace: [ 519.432443][T29945] [ 519.432452][T29945] dump_stack_lvl+0xf2/0x150 [ 519.432486][T29945] dump_stack+0x15/0x1a [ 519.432523][T29945] should_fail_ex+0x24a/0x260 [ 519.432560][T29945] should_fail+0xb/0x10 [ 519.432592][T29945] should_fail_usercopy+0x1a/0x20 [ 519.432699][T29945] _copy_from_user+0x1c/0xa0 [ 519.432739][T29945] copy_msghdr_from_user+0x54/0x2a0 [ 519.432813][T29945] ? __fget_files+0x17c/0x1c0 [ 519.432853][T29945] __sys_sendmsg+0x13e/0x230 [ 519.432962][T29945] __x64_sys_sendmsg+0x46/0x50 [ 519.433034][T29945] x64_sys_call+0x2734/0x2dc0 [ 519.433128][T29945] do_syscall_64+0xc9/0x1c0 [ 519.433170][T29945] ? clear_bhb_loop+0x55/0xb0 [ 519.433205][T29945] ? clear_bhb_loop+0x55/0xb0 [ 519.433241][T29945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 519.433279][T29945] RIP: 0033:0x7f7a8d59d169 [ 519.433296][T29945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 519.433319][T29945] RSP: 002b:00007f7a8bc07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 519.433343][T29945] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59d169 [ 519.433359][T29945] RDX: 0000000020000040 RSI: 0000400000000100 RDI: 0000000000000003 [ 519.433373][T29945] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 519.433445][T29945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.433459][T29945] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 519.433483][T29945] [ 519.434699][T29943] syzkaller1: entered promiscuous mode [ 519.613320][T29943] syzkaller1: entered allmulticast mode [ 519.772441][T29963] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 519.787359][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 519.839669][ T29] audit: type=1400 audit(2000262856.362:32141): avc: denied { create } for pid=29969 comm="syz.0.10041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 520.134792][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 520.172035][ T29] audit: type=1326 audit(2000262856.680:32142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.5.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b085d169 code=0x7ffc0000 [ 520.210770][ T29] audit: type=1326 audit(2000262856.680:32143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.5.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b085d169 code=0x7ffc0000 [ 520.234563][ T29] audit: type=1326 audit(2000262856.680:32144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.5.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=200 compat=0 ip=0x7f38b085d169 code=0x7ffc0000 [ 520.258484][ T29] audit: type=1326 audit(2000262856.680:32145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.5.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b085d169 code=0x7ffc0000 [ 520.464481][T30040] siw: device registration error -23 [ 520.532337][T30042] lo speed is unknown, defaulting to 1000 [ 520.564024][T30045] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10070'. [ 520.963932][T30076] FAULT_INJECTION: forcing a failure. [ 520.963932][T30076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 520.977180][T30076] CPU: 1 UID: 0 PID: 30076 Comm: +}[@ Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 520.977208][T30076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 520.977223][T30076] Call Trace: [ 520.977230][T30076] [ 520.977239][T30076] dump_stack_lvl+0xf2/0x150 [ 520.977269][T30076] dump_stack+0x15/0x1a [ 520.977358][T30076] should_fail_ex+0x24a/0x260 [ 520.977384][T30076] should_fail+0xb/0x10 [ 520.977413][T30076] should_fail_usercopy+0x1a/0x20 [ 520.977565][T30076] _copy_from_user+0x1c/0xa0 [ 520.977595][T30076] move_addr_to_kernel+0x82/0x120 [ 520.977622][T30076] __sys_bind+0x9e/0x190 [ 520.977654][T30076] __x64_sys_bind+0x41/0x50 [ 520.977765][T30076] x64_sys_call+0x20ab/0x2dc0 [ 520.977802][T30076] do_syscall_64+0xc9/0x1c0 [ 520.977882][T30076] ? clear_bhb_loop+0x55/0xb0 [ 520.978038][T30076] ? clear_bhb_loop+0x55/0xb0 [ 520.978061][T30076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 520.978109][T30076] RIP: 0033:0x7f038b03d169 [ 520.978123][T30076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 520.978164][T30076] RSP: 002b:00007f03896a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 520.978187][T30076] RAX: ffffffffffffffda RBX: 00007f038b255fa0 RCX: 00007f038b03d169 [ 520.978201][T30076] RDX: 0000000000000014 RSI: 0000400000000280 RDI: 0000000000000003 [ 520.978212][T30076] RBP: 00007f03896a7090 R08: 0000000000000000 R09: 0000000000000000 [ 520.978222][T30076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.978233][T30076] R13: 0000000000000000 R14: 00007f038b255fa0 R15: 00007ffc5672e628 [ 520.978257][T30076] [ 521.210920][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 521.391173][T30104] SELinux: +}[@ (30104) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 521.701734][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 522.149913][T30129] xt_CT: No such helper "pptp" [ 522.386573][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 522.587158][T30149] IPv6: Can't replace route, no match found [ 522.622822][T30169] Invalid ELF header magic: != ELF [ 522.642089][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 522.785301][T30181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41664 sclass=netlink_route_socket pid=30181 comm=syz.5.10122 [ 523.439907][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 523.843939][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 523.964860][T30239] FAULT_INJECTION: forcing a failure. [ 523.964860][T30239] name failslab, interval 1, probability 0, space 0, times 0 [ 523.978381][T30239] CPU: 0 UID: 0 PID: 30239 Comm: syz.0.10150 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 523.978407][T30239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 523.978422][T30239] Call Trace: [ 523.978429][T30239] [ 523.978438][T30239] dump_stack_lvl+0xf2/0x150 [ 523.978469][T30239] dump_stack+0x15/0x1a [ 523.978551][T30239] should_fail_ex+0x24a/0x260 [ 523.978580][T30239] should_failslab+0x8f/0xb0 [ 523.978615][T30239] kmem_cache_alloc_node_noprof+0x59/0x320 [ 523.978712][T30239] ? __alloc_skb+0x10b/0x310 [ 523.978733][T30239] __alloc_skb+0x10b/0x310 [ 523.978752][T30239] netlink_ack+0xef/0x4f0 [ 523.978786][T30239] netlink_rcv_skb+0x19c/0x230 [ 523.978858][T30239] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 523.978885][T30239] nfnetlink_rcv+0x16c/0x15d0 [ 523.978912][T30239] ? kmem_cache_free+0xdc/0x2d0 [ 523.978938][T30239] ? nlmon_xmit+0x51/0x60 [ 523.978993][T30239] ? __kfree_skb+0x102/0x150 [ 523.979012][T30239] ? consume_skb+0x49/0x160 [ 523.979032][T30239] ? nlmon_xmit+0x51/0x60 [ 523.979111][T30239] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 523.979138][T30239] ? __dev_queue_xmit+0xb6e/0x2090 [ 523.979226][T30239] ? ref_tracker_free+0x3a5/0x410 [ 523.979287][T30239] ? __netlink_deliver_tap+0x4c6/0x4f0 [ 523.979330][T30239] netlink_unicast+0x599/0x670 [ 523.979359][T30239] netlink_sendmsg+0x5cc/0x6e0 [ 523.979402][T30239] ? __pfx_netlink_sendmsg+0x10/0x10 [ 523.979481][T30239] __sock_sendmsg+0x140/0x180 [ 523.979519][T30239] ____sys_sendmsg+0x326/0x4b0 [ 523.979552][T30239] __sys_sendmsg+0x19d/0x230 [ 523.979589][T30239] __x64_sys_sendmsg+0x46/0x50 [ 523.979686][T30239] x64_sys_call+0x2734/0x2dc0 [ 523.979719][T30239] do_syscall_64+0xc9/0x1c0 [ 523.979751][T30239] ? clear_bhb_loop+0x55/0xb0 [ 523.979785][T30239] ? clear_bhb_loop+0x55/0xb0 [ 523.979871][T30239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.979908][T30239] RIP: 0033:0x7f1aa6d0d169 [ 523.979930][T30239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.979951][T30239] RSP: 002b:00007f1aa5377038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 523.979970][T30239] RAX: ffffffffffffffda RBX: 00007f1aa6f25fa0 RCX: 00007f1aa6d0d169 [ 523.979982][T30239] RDX: 0000000000001000 RSI: 0000400000000200 RDI: 0000000000000003 [ 523.979994][T30239] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 523.980009][T30239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.980023][T30239] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 523.980058][T30239] [ 524.713845][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 524.821052][T30263] xt_CT: No such helper "pptp" [ 525.055184][T30282] usb usb1: usbfs: process 30282 (syz.7.10169) did not claim interface 0 before use [ 525.174997][T30296] FAULT_INJECTION: forcing a failure. [ 525.174997][T30296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.188296][T30296] CPU: 1 UID: 0 PID: 30296 Comm: syz.4.10174 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 525.188361][T30296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 525.188377][T30296] Call Trace: [ 525.188385][T30296] [ 525.188394][T30296] dump_stack_lvl+0xf2/0x150 [ 525.188443][T30296] dump_stack+0x15/0x1a [ 525.188527][T30296] should_fail_ex+0x24a/0x260 [ 525.188564][T30296] should_fail+0xb/0x10 [ 525.188596][T30296] should_fail_usercopy+0x1a/0x20 [ 525.188635][T30296] _copy_from_iter+0xd5/0xd00 [ 525.188786][T30296] ? kmalloc_reserve+0x16e/0x190 [ 525.188811][T30296] ? __build_skb_around+0x196/0x1f0 [ 525.188843][T30296] ? __alloc_skb+0x21f/0x310 [ 525.188982][T30296] ? __virt_addr_valid+0x1ed/0x250 [ 525.189010][T30296] ? __check_object_size+0x364/0x520 [ 525.189105][T30296] netlink_sendmsg+0x460/0x6e0 [ 525.189173][T30296] ? __pfx_netlink_sendmsg+0x10/0x10 [ 525.189213][T30296] __sock_sendmsg+0x140/0x180 [ 525.189312][T30296] ____sys_sendmsg+0x326/0x4b0 [ 525.189367][T30296] __sys_sendmsg+0x19d/0x230 [ 525.189413][T30296] __x64_sys_sendmsg+0x46/0x50 [ 525.189568][T30296] x64_sys_call+0x2734/0x2dc0 [ 525.189596][T30296] do_syscall_64+0xc9/0x1c0 [ 525.189701][T30296] ? clear_bhb_loop+0x55/0xb0 [ 525.189735][T30296] ? clear_bhb_loop+0x55/0xb0 [ 525.189820][T30296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.189855][T30296] RIP: 0033:0x7f038b03d169 [ 525.189874][T30296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.189925][T30296] RSP: 002b:00007f03896a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.189944][T30296] RAX: ffffffffffffffda RBX: 00007f038b255fa0 RCX: 00007f038b03d169 [ 525.189956][T30296] RDX: 0000000000000000 RSI: 0000400000000540 RDI: 0000000000000003 [ 525.189970][T30296] RBP: 00007f03896a7090 R08: 0000000000000000 R09: 0000000000000000 [ 525.189985][T30296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.190000][T30296] R13: 0000000000000000 R14: 00007f038b255fa0 R15: 00007ffc5672e628 [ 525.190021][T30296] [ 525.940122][T30304] FAULT_INJECTION: forcing a failure. [ 525.940122][T30304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.953452][T30304] CPU: 0 UID: 0 PID: 30304 Comm: syz.6.10176 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 525.953527][T30304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 525.953540][T30304] Call Trace: [ 525.953621][T30304] [ 525.953629][T30304] dump_stack_lvl+0xf2/0x150 [ 525.953657][T30304] dump_stack+0x15/0x1a [ 525.953739][T30304] should_fail_ex+0x24a/0x260 [ 525.953778][T30304] should_fail+0xb/0x10 [ 525.953875][T30304] should_fail_usercopy+0x1a/0x20 [ 525.953913][T30304] strncpy_from_user+0x25/0x210 [ 525.953994][T30304] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 525.954022][T30304] ? getname_flags+0x81/0x3b0 [ 525.954063][T30304] getname_flags+0xb0/0x3b0 [ 525.954104][T30304] user_path_at+0x26/0x120 [ 525.954132][T30304] __se_sys_mount+0x24b/0x2d0 [ 525.954201][T30304] ? fput+0x1c4/0x200 [ 525.954228][T30304] __x64_sys_mount+0x67/0x80 [ 525.954262][T30304] x64_sys_call+0x2c84/0x2dc0 [ 525.954355][T30304] do_syscall_64+0xc9/0x1c0 [ 525.954385][T30304] ? clear_bhb_loop+0x55/0xb0 [ 525.954425][T30304] ? clear_bhb_loop+0x55/0xb0 [ 525.954451][T30304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.954477][T30304] RIP: 0033:0x7f0a774cd169 [ 525.954495][T30304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.954592][T30304] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 525.954614][T30304] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 525.954626][T30304] RDX: 00004000000002c0 RSI: 0000400000000080 RDI: 0000000000000000 [ 525.954639][T30304] RBP: 00007f0a75b31090 R08: 0000400000000400 R09: 0000000000000000 [ 525.954654][T30304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.954668][T30304] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 525.954691][T30304] [ 526.108773][T30300] dccp_invalid_packet: P.Data Offset(172) too large [ 526.291282][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 526.291300][ T29] audit: type=1400 audit(2000262862.405:32200): avc: denied { ioctl } for pid=30317 comm="syz.0.10183" path="socket:[104804]" dev="sockfs" ino=104804 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 526.333826][T30323] vlan2: entered promiscuous mode [ 526.339001][T30323] vlan2: entered allmulticast mode [ 526.344176][T30323] hsr_slave_0: entered allmulticast mode [ 526.424706][T30328] sit0: entered promiscuous mode [ 526.431274][T30328] vlan3: entered promiscuous mode [ 526.455360][T30328] sit0: left promiscuous mode [ 526.550275][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 526.651527][T30353] xt_CT: No such helper "pptp" [ 526.716183][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 526.830339][ T29] audit: type=1400 audit(2000262862.900:32201): avc: denied { name_bind } for pid=30384 comm="syz.0.10210" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 526.897889][T30391] xt_CT: No such helper "pptp" [ 526.940048][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 527.000741][T30407] usb usb1: usbfs: process 30407 (syz.0.10220) did not claim interface 0 before use [ 527.074999][T30415] FAULT_INJECTION: forcing a failure. [ 527.074999][T30415] name failslab, interval 1, probability 0, space 0, times 0 [ 527.080420][T30417] xt_connbytes: Forcing CT accounting to be enabled [ 527.087676][T30415] CPU: 0 UID: 0 PID: 30415 Comm: syz.0.10223 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 527.087712][T30415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 527.087794][T30415] Call Trace: [ 527.087802][T30415] [ 527.087812][T30415] dump_stack_lvl+0xf2/0x150 [ 527.087848][T30415] dump_stack+0x15/0x1a [ 527.087875][T30415] should_fail_ex+0x24a/0x260 [ 527.087920][T30415] should_failslab+0x8f/0xb0 [ 527.087958][T30415] kmem_cache_alloc_noprof+0x52/0x320 [ 527.087985][T30415] ? skb_clone+0x154/0x1f0 [ 527.088022][T30415] skb_clone+0x154/0x1f0 [ 527.088053][T30415] __netlink_deliver_tap+0x2bd/0x4f0 [ 527.088191][T30415] netlink_unicast+0x64a/0x670 [ 527.088229][T30415] netlink_sendmsg+0x5cc/0x6e0 [ 527.088312][T30415] ? __pfx_netlink_sendmsg+0x10/0x10 [ 527.088382][T30415] __sock_sendmsg+0x140/0x180 [ 527.088420][T30415] ____sys_sendmsg+0x326/0x4b0 [ 527.088516][T30415] __sys_sendmsg+0x19d/0x230 [ 527.088563][T30415] __x64_sys_sendmsg+0x46/0x50 [ 527.088593][T30415] x64_sys_call+0x2734/0x2dc0 [ 527.088666][T30415] do_syscall_64+0xc9/0x1c0 [ 527.088709][T30415] ? clear_bhb_loop+0x55/0xb0 [ 527.088803][T30415] ? clear_bhb_loop+0x55/0xb0 [ 527.088835][T30415] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.088885][T30415] RIP: 0033:0x7f1aa6d0d169 [ 527.088905][T30415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.089029][T30415] RSP: 002b:00007f1aa5377038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 527.089052][T30415] RAX: ffffffffffffffda RBX: 00007f1aa6f25fa0 RCX: 00007f1aa6d0d169 [ 527.089068][T30415] RDX: 0000000000000000 RSI: 00004000000002c0 RDI: 0000000000000006 [ 527.089085][T30415] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 527.089101][T30415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.089168][T30415] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 527.089192][T30415] [ 527.226766][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 527.243601][T30417] Cannot find set identified by id 0 to match [ 527.361934][T30435] syzkaller1: entered promiscuous mode [ 527.367586][T30435] syzkaller1: entered allmulticast mode [ 527.606491][ T29] audit: type=1400 audit(2000262863.630:32202): avc: denied { getopt } for pid=30460 comm="syz.7.10244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 527.888989][ C0] net_ratelimit: 1 callbacks suppressed [ 527.889004][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 528.215393][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 528.305356][ T29] audit: type=1400 audit(2000262864.285:32203): avc: denied { map } for pid=30522 comm="syz.0.10272" path="/dev/net/tun" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 528.329994][ T29] audit: type=1400 audit(2000262864.285:32204): avc: denied { execute } for pid=30522 comm="syz.0.10272" path="/dev/net/tun" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 528.356468][T30523] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10272'. [ 528.395376][T30525] usb usb1: usbfs: process 30525 (syz.5.10273) did not claim interface 0 before use [ 528.455692][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 528.532822][T30544] FAULT_INJECTION: forcing a failure. [ 528.532822][T30544] name failslab, interval 1, probability 0, space 0, times 0 [ 528.545781][T30544] CPU: 0 UID: 0 PID: 30544 Comm: syz.0.10282 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 528.545838][T30544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 528.545851][T30544] Call Trace: [ 528.545858][T30544] [ 528.545865][T30544] dump_stack_lvl+0xf2/0x150 [ 528.545893][T30544] dump_stack+0x15/0x1a [ 528.545931][T30544] should_fail_ex+0x24a/0x260 [ 528.546021][T30544] should_failslab+0x8f/0xb0 [ 528.546056][T30544] kmem_cache_alloc_noprof+0x52/0x320 [ 528.546080][T30544] ? sk_prot_alloc+0x41/0x190 [ 528.546109][T30544] sk_prot_alloc+0x41/0x190 [ 528.546213][T30544] sk_alloc+0x33/0x360 [ 528.546233][T30544] ? inet_create+0x39c/0x750 [ 528.546262][T30544] inet_create+0x3b8/0x750 [ 528.546299][T30544] __sock_create+0x2e9/0x5a0 [ 528.546361][T30544] sock_create_kern+0x38/0x50 [ 528.546401][T30544] udp_sock_create4+0x67/0x2a0 [ 528.546484][T30544] rxrpc_lookup_local+0x835/0xca0 [ 528.546535][T30544] rxrpc_bind+0x30d/0x490 [ 528.546577][T30544] __sys_bind+0x10c/0x190 [ 528.546683][T30544] __x64_sys_bind+0x41/0x50 [ 528.546850][T30544] x64_sys_call+0x20ab/0x2dc0 [ 528.546876][T30544] do_syscall_64+0xc9/0x1c0 [ 528.546909][T30544] ? clear_bhb_loop+0x55/0xb0 [ 528.546993][T30544] ? clear_bhb_loop+0x55/0xb0 [ 528.547027][T30544] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 528.547056][T30544] RIP: 0033:0x7f1aa6d0d169 [ 528.547073][T30544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 528.547119][T30544] RSP: 002b:00007f1aa5377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 528.547142][T30544] RAX: ffffffffffffffda RBX: 00007f1aa6f25fa0 RCX: 00007f1aa6d0d169 [ 528.547157][T30544] RDX: 0000000000000024 RSI: 0000400000000000 RDI: 0000000000000005 [ 528.547172][T30544] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 528.547186][T30544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 528.547201][T30544] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 528.547249][T30544] [ 528.830190][ T29] audit: type=1326 audit(2000262864.771:32205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30547 comm="syz.0.10284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6d0d169 code=0x7ffc0000 [ 528.854098][ T29] audit: type=1326 audit(2000262864.771:32206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30547 comm="syz.0.10284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6d0d169 code=0x7ffc0000 [ 528.879487][ T29] audit: type=1326 audit(2000262864.809:32207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30547 comm="syz.0.10284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6d0d169 code=0x7ffc0000 [ 528.903875][ T29] audit: type=1326 audit(2000262864.809:32208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30547 comm="syz.0.10284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6d0d169 code=0x7ffc0000 [ 528.928501][ T29] audit: type=1326 audit(2000262864.809:32209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30547 comm="syz.0.10284" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6d0d169 code=0x7ffc0000 [ 529.038646][T30553] usb usb1: usbfs: process 30553 (syz.6.10285) did not claim interface 0 before use [ 529.117918][T30561] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10289'. [ 529.197678][T30556] dccp_invalid_packet: P.Data Offset(172) too large [ 529.557731][T30582] IPv6: Can't replace route, no match found [ 529.720228][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 529.793868][T30606] dccp_invalid_packet: P.type (CLOSE) not Data || [Data]Ack, while P.X == 0 [ 529.922663][T30604] dccp_invalid_packet: P.Data Offset(172) too large [ 530.024955][T30616] IPv6: Can't replace route, no match found [ 530.104114][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 530.616579][T30641] dccp_invalid_packet: P.Data Offset(172) too large [ 530.759654][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 530.797095][T30656] netlink: 20 bytes leftover after parsing attributes in process `syz.5.10325'. [ 530.817033][T30656] netlink: 20 bytes leftover after parsing attributes in process `syz.5.10325'. [ 530.842261][T30660] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 530.978024][T30667] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 531.038409][T30669] FAULT_INJECTION: forcing a failure. [ 531.038409][T30669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 531.051552][T30669] CPU: 0 UID: 0 PID: 30669 Comm: syz.0.10331 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 531.051584][T30669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 531.051600][T30669] Call Trace: [ 531.051609][T30669] [ 531.051618][T30669] dump_stack_lvl+0xf2/0x150 [ 531.051652][T30669] dump_stack+0x15/0x1a [ 531.051673][T30669] should_fail_ex+0x24a/0x260 [ 531.051708][T30669] should_fail+0xb/0x10 [ 531.051734][T30669] should_fail_usercopy+0x1a/0x20 [ 531.051835][T30669] strncpy_from_user+0x25/0x210 [ 531.051930][T30669] ? selinux_file_permission+0x22a/0x360 [ 531.051967][T30669] ? __rcu_read_unlock+0x4e/0x70 [ 531.051993][T30669] path_removexattrat+0x81/0x4b0 [ 531.052020][T30669] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 531.052095][T30669] __x64_sys_fremovexattr+0x35/0x40 [ 531.052177][T30669] x64_sys_call+0x1c51/0x2dc0 [ 531.052266][T30669] do_syscall_64+0xc9/0x1c0 [ 531.052298][T30669] ? clear_bhb_loop+0x55/0xb0 [ 531.052332][T30669] ? clear_bhb_loop+0x55/0xb0 [ 531.052462][T30669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.052534][T30669] RIP: 0033:0x7f1aa6d0d169 [ 531.052553][T30669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 531.052575][T30669] RSP: 002b:00007f1aa5377038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 531.052598][T30669] RAX: ffffffffffffffda RBX: 00007f1aa6f25fa0 RCX: 00007f1aa6d0d169 [ 531.052632][T30669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 531.052644][T30669] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 531.052656][T30669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.052667][T30669] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 531.052685][T30669] [ 531.340583][T30684] Invalid ELF header magic: != ELF [ 531.459873][T30689] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 531.514540][T30697] FAULT_INJECTION: forcing a failure. [ 531.514540][T30697] name failslab, interval 1, probability 0, space 0, times 0 [ 531.527295][T30697] CPU: 0 UID: 0 PID: 30697 Comm: syz.6.10342 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 531.527327][T30697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 531.527340][T30697] Call Trace: [ 531.527348][T30697] [ 531.527356][T30697] dump_stack_lvl+0xf2/0x150 [ 531.527393][T30697] dump_stack+0x15/0x1a [ 531.527464][T30697] should_fail_ex+0x24a/0x260 [ 531.527531][T30697] ? alloc_pipe_info+0xb0/0x360 [ 531.527642][T30697] should_failslab+0x8f/0xb0 [ 531.527776][T30697] __kmalloc_cache_noprof+0x4e/0x320 [ 531.527807][T30697] alloc_pipe_info+0xb0/0x360 [ 531.527837][T30697] splice_direct_to_actor+0x60f/0x670 [ 531.527864][T30697] ? __pfx_direct_splice_actor+0x10/0x10 [ 531.527890][T30697] ? 0xffffffff81000000 [ 531.527903][T30697] ? selinux_file_permission+0x22a/0x360 [ 531.527990][T30697] ? __rcu_read_unlock+0x4e/0x70 [ 531.528013][T30697] ? avc_policy_seqno+0x15/0x20 [ 531.528031][T30697] ? selinux_file_permission+0x22a/0x360 [ 531.528062][T30697] do_splice_direct+0xd7/0x150 [ 531.528086][T30697] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 531.528180][T30697] do_sendfile+0x398/0x660 [ 531.528204][T30697] __x64_sys_sendfile64+0x110/0x150 [ 531.528276][T30697] x64_sys_call+0xfbd/0x2dc0 [ 531.528378][T30697] do_syscall_64+0xc9/0x1c0 [ 531.528411][T30697] ? clear_bhb_loop+0x55/0xb0 [ 531.528438][T30697] ? clear_bhb_loop+0x55/0xb0 [ 531.528527][T30697] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.528555][T30697] RIP: 0033:0x7f0a774cd169 [ 531.528569][T30697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 531.528587][T30697] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 531.528606][T30697] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 531.528618][T30697] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 531.528743][T30697] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 531.528755][T30697] R10: 000000000000003a R11: 0000000000000246 R12: 0000000000000001 [ 531.528767][T30697] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 531.528827][T30697] [ 531.778795][T30702] xt_CT: No such helper "pptp" [ 531.845296][T30713] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 532.258165][T30736] xt_CT: No such helper "pptp" [ 532.289039][T30741] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 532.526919][T30757] usb usb1: usbfs: process 30757 (syz.0.10367) did not claim interface 0 before use [ 532.583148][T30764] Invalid ELF header magic: != ELF [ 532.639731][T30771] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 532.672094][T30775] vhci_hcd: invalid port number 252 [ 532.677328][T30775] vhci_hcd: default hub control req: 0401 v0001 i00fc l0 [ 532.918653][T30787] usb usb1: usbfs: process 30787 (syz.5.10379) did not claim interface 0 before use [ 533.018741][T30801] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 533.203993][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 533.204012][ T29] audit: type=1326 audit(2000262868.878:32308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 533.204412][T30814] FAULT_INJECTION: forcing a failure. [ 533.204412][T30814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 533.210655][ T29] audit: type=1326 audit(2000262868.878:32309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 533.234270][T30814] CPU: 0 UID: 0 PID: 30814 Comm: syz.6.10389 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 533.234320][T30814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 533.234337][T30814] Call Trace: [ 533.234346][T30814] [ 533.234357][T30814] dump_stack_lvl+0xf2/0x150 [ 533.234412][T30814] dump_stack+0x15/0x1a [ 533.234440][T30814] should_fail_ex+0x24a/0x260 [ 533.234558][T30814] should_fail+0xb/0x10 [ 533.234590][T30814] should_fail_usercopy+0x1a/0x20 [ 533.234631][T30814] _copy_to_user+0x20/0xa0 [ 533.234699][T30814] simple_read_from_buffer+0xa0/0x110 [ 533.234735][T30814] proc_fail_nth_read+0xf9/0x140 [ 533.234783][T30814] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 533.234892][T30814] vfs_read+0x19b/0x6f0 [ 533.234923][T30814] ? __rcu_read_unlock+0x4e/0x70 [ 533.234952][T30814] ? __fget_files+0x17c/0x1c0 [ 533.234996][T30814] ksys_read+0xe8/0x1b0 [ 533.235050][T30814] __x64_sys_read+0x42/0x50 [ 533.235121][T30814] x64_sys_call+0x2874/0x2dc0 [ 533.235155][T30814] do_syscall_64+0xc9/0x1c0 [ 533.235193][T30814] ? clear_bhb_loop+0x55/0xb0 [ 533.235227][T30814] ? clear_bhb_loop+0x55/0xb0 [ 533.235392][T30814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.235549][T30814] RIP: 0033:0x7f0a774cbb7c [ 533.235568][T30814] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 533.235591][T30814] RSP: 002b:00007f0a75b31030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 533.235643][T30814] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cbb7c [ 533.235667][T30814] RDX: 000000000000000f RSI: 00007f0a75b310a0 RDI: 0000000000000005 [ 533.235682][T30814] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 533.235697][T30814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.235712][T30814] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 533.235736][T30814] [ 533.467061][ T29] audit: type=1326 audit(2000262868.878:32310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0a774cbad0 code=0x7ffc0000 [ 533.490982][ T29] audit: type=1326 audit(2000262868.878:32311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0a774cbc1f code=0x7ffc0000 [ 533.514515][ T29] audit: type=1326 audit(2000262868.878:32312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=188 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 533.520085][T30818] usb usb1: usbfs: process 30818 (syz.7.10391) did not claim interface 0 before use [ 533.538366][ T29] audit: type=1326 audit(2000262868.878:32313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f0a774cbb7c code=0x7ffc0000 [ 533.572434][ T29] audit: type=1326 audit(2000262868.906:32314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0a774cbc1f code=0x7ffc0000 [ 533.596037][ T29] audit: type=1326 audit(2000262868.906:32315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0a774cbc1f code=0x7ffc0000 [ 533.619708][ T29] audit: type=1326 audit(2000262868.906:32316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30813 comm="syz.6.10389" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f0a774cd169 code=0x7ffc0000 [ 533.647885][T30821] lo speed is unknown, defaulting to 1000 [ 533.685061][T30825] FAULT_INJECTION: forcing a failure. [ 533.685061][T30825] name failslab, interval 1, probability 0, space 0, times 0 [ 533.697805][T30825] CPU: 0 UID: 0 PID: 30825 Comm: syz.7.10394 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 533.697897][T30825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 533.697913][T30825] Call Trace: [ 533.697922][T30825] [ 533.697932][T30825] dump_stack_lvl+0xf2/0x150 [ 533.697966][T30825] dump_stack+0x15/0x1a [ 533.698011][T30825] should_fail_ex+0x24a/0x260 [ 533.698057][T30825] should_failslab+0x8f/0xb0 [ 533.698094][T30825] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 533.698174][T30825] ? __d_alloc+0x3d/0x350 [ 533.698196][T30825] __d_alloc+0x3d/0x350 [ 533.698219][T30825] d_alloc_pseudo+0x1e/0x80 [ 533.698246][T30825] alloc_file_pseudo+0x73/0x160 [ 533.698275][T30825] __shmem_file_setup+0x1bb/0x1f0 [ 533.698326][T30825] shmem_file_setup+0x3b/0x50 [ 533.698428][T30825] __se_sys_memfd_create+0x2e1/0x5a0 [ 533.698455][T30825] __x64_sys_memfd_create+0x31/0x40 [ 533.698480][T30825] x64_sys_call+0x2d4c/0x2dc0 [ 533.698513][T30825] do_syscall_64+0xc9/0x1c0 [ 533.698587][T30825] ? clear_bhb_loop+0x55/0xb0 [ 533.698665][T30825] ? clear_bhb_loop+0x55/0xb0 [ 533.698699][T30825] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.698733][T30825] RIP: 0033:0x7f7a8d59d169 [ 533.698750][T30825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.698772][T30825] RSP: 002b:00007f7a8bc06e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 533.698795][T30825] RAX: ffffffffffffffda RBX: 0000000000000446 RCX: 00007f7a8d59d169 [ 533.698810][T30825] RDX: 00007f7a8bc06ef0 RSI: 0000000000000000 RDI: 00007f7a8d61ec3c [ 533.698894][T30825] RBP: 0000400000000d40 R08: 00007f7a8bc06bb7 R09: 00007f7a8bc06e40 [ 533.698909][T30825] R10: 000000000000000a R11: 0000000000000202 R12: 0000400000000000 [ 533.698924][T30825] R13: 00007f7a8bc06ef0 R14: 00007f7a8bc06eb0 R15: 0000400000000200 [ 533.698946][T30825] [ 533.906596][T30826] syz.6.10393 (30826): attempted to duplicate a private mapping with mremap. This is not supported. [ 533.964465][T30831] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 533.995012][T30835] netlink: 20 bytes leftover after parsing attributes in process `syz.7.10397'. [ 534.016953][T30835] netdevsim netdevsim7 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 534.025775][T30835] netdevsim netdevsim7 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 534.034645][T30835] netdevsim netdevsim7 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 534.043395][T30835] netdevsim netdevsim7 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 534.055712][ T29] audit: type=1326 audit(2000262869.663:32317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30834 comm="syz.7.10397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a8d59d169 code=0x7ffc0000 [ 534.084423][T30835] vhci_hcd: invalid port number 252 [ 534.089652][T30835] vhci_hcd: default hub control req: 0401 v0001 i00fc l0 [ 534.129979][T30844] xt_CT: No such helper "pptp" [ 534.204053][T30847] net_ratelimit: 3 callbacks suppressed [ 534.204068][T30847] IPVS: sh: UDP 224.0.0.2:0 - no destination available [ 534.217203][ T3375] IPVS: starting estimator thread 0... [ 534.244082][T30856] usb usb1: usbfs: process 30856 (syz.7.10404) did not claim interface 0 before use [ 534.362635][T30860] FAULT_INJECTION: forcing a failure. [ 534.362635][T30860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 534.375851][T30860] CPU: 1 UID: 0 PID: 30860 Comm: syz.7.10406 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 534.375881][T30860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 534.375893][T30860] Call Trace: [ 534.375899][T30860] [ 534.375929][T30860] dump_stack_lvl+0xf2/0x150 [ 534.375963][T30860] dump_stack+0x15/0x1a [ 534.375990][T30860] should_fail_ex+0x24a/0x260 [ 534.376027][T30860] should_fail+0xb/0x10 [ 534.376119][T30860] should_fail_usercopy+0x1a/0x20 [ 534.376225][T30860] _copy_to_user+0x20/0xa0 [ 534.376243][T30860] simple_read_from_buffer+0xa0/0x110 [ 534.376275][T30860] proc_fail_nth_read+0xf9/0x140 [ 534.376351][T30860] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 534.376380][T30860] vfs_read+0x19b/0x6f0 [ 534.376405][T30860] ? __rcu_read_unlock+0x4e/0x70 [ 534.376433][T30860] ? __fget_files+0x17c/0x1c0 [ 534.376491][T30860] ksys_read+0xe8/0x1b0 [ 534.376516][T30860] __x64_sys_read+0x42/0x50 [ 534.376545][T30860] x64_sys_call+0x2874/0x2dc0 [ 534.376578][T30860] do_syscall_64+0xc9/0x1c0 [ 534.376618][T30860] ? clear_bhb_loop+0x55/0xb0 [ 534.376646][T30860] ? clear_bhb_loop+0x55/0xb0 [ 534.376672][T30860] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.376760][T30860] RIP: 0033:0x7f7a8d59bb7c [ 534.376779][T30860] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 534.376799][T30860] RSP: 002b:00007f7a8bc07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 534.376850][T30860] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59bb7c [ 534.376865][T30860] RDX: 000000000000000f RSI: 00007f7a8bc070a0 RDI: 0000000000000004 [ 534.376878][T30860] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 534.376892][T30860] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 534.376904][T30860] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 534.376922][T30860] [ 534.432679][T30853] IPVS: using max 2352 ests per chain, 117600 per kthread [ 534.739669][T30880] xt_CT: No such helper "pptp" [ 534.804937][T30891] usb usb1: usbfs: process 30891 (syz.7.10416) did not claim interface 0 before use [ 534.851951][T30893] tipc: Started in network mode [ 534.856940][T30893] tipc: Node identity ac14140f, cluster identity 4711 [ 534.874819][T30893] tipc: New replicast peer: 255.255.255.255 [ 534.881124][T30893] tipc: Enabled bearer , priority 10 [ 534.943847][T30900] FAULT_INJECTION: forcing a failure. [ 534.943847][T30900] name failslab, interval 1, probability 0, space 0, times 0 [ 534.956625][T30900] CPU: 1 UID: 0 PID: 30900 Comm: syz.7.10419 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 534.956663][T30900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 534.956679][T30900] Call Trace: [ 534.956688][T30900] [ 534.956725][T30900] dump_stack_lvl+0xf2/0x150 [ 534.956759][T30900] dump_stack+0x15/0x1a [ 534.956786][T30900] should_fail_ex+0x24a/0x260 [ 534.956824][T30900] should_failslab+0x8f/0xb0 [ 534.956861][T30900] kmem_cache_alloc_noprof+0x52/0x320 [ 534.956889][T30900] ? getname_flags+0x81/0x3b0 [ 534.956931][T30900] getname_flags+0x81/0x3b0 [ 534.956965][T30900] getname_uflags+0x24/0x30 [ 534.957027][T30900] __x64_sys_execveat+0x5e/0x90 [ 534.957062][T30900] x64_sys_call+0x291e/0x2dc0 [ 534.957095][T30900] do_syscall_64+0xc9/0x1c0 [ 534.957160][T30900] ? clear_bhb_loop+0x55/0xb0 [ 534.957201][T30900] ? clear_bhb_loop+0x55/0xb0 [ 534.957255][T30900] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.957289][T30900] RIP: 0033:0x7f7a8d59d169 [ 534.957307][T30900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 534.957326][T30900] RSP: 002b:00007f7a8bc07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 534.957345][T30900] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59d169 [ 534.957400][T30900] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 534.957415][T30900] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 534.957431][T30900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 534.957446][T30900] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 534.957468][T30900] [ 535.250175][T30905] pim6reg1: entered promiscuous mode [ 535.255534][T30905] pim6reg1: entered allmulticast mode [ 535.441410][T30921] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 535.529017][T30925] lo speed is unknown, defaulting to 1000 [ 535.636225][T30934] netlink: 20 bytes leftover after parsing attributes in process `syz.0.10434'. [ 535.874954][T30939] dccp_invalid_packet: P.Data Offset(172) too large [ 535.911824][T30943] dccp_invalid_packet: P.Data Offset(172) too large [ 535.955527][T30951] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 536.015446][T30957] FAULT_INJECTION: forcing a failure. [ 536.015446][T30957] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 536.025653][ T3355] tipc: Node number set to 2886997007 [ 536.028638][T30957] CPU: 0 UID: 0 PID: 30957 Comm: syz.6.10444 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 536.028672][T30957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 536.028689][T30957] Call Trace: [ 536.028696][T30957] [ 536.028706][T30957] dump_stack_lvl+0xf2/0x150 [ 536.028741][T30957] dump_stack+0x15/0x1a [ 536.028837][T30957] should_fail_ex+0x24a/0x260 [ 536.028875][T30957] should_fail+0xb/0x10 [ 536.028909][T30957] should_fail_usercopy+0x1a/0x20 [ 536.029014][T30957] _copy_from_user+0x1c/0xa0 [ 536.029057][T30957] do_ipt_set_ctl+0x423/0x8b0 [ 536.029094][T30957] ? _raw_spin_unlock_bh+0x36/0x40 [ 536.029120][T30957] ? lock_sock_nested+0x10f/0x140 [ 536.029230][T30957] nf_setsockopt+0x195/0x1b0 [ 536.029352][T30957] ip_setsockopt+0xea/0x100 [ 536.029411][T30957] udp_setsockopt+0x95/0xb0 [ 536.029439][T30957] sock_common_setsockopt+0x64/0x80 [ 536.029480][T30957] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 536.029597][T30957] __sys_setsockopt+0x187/0x200 [ 536.029628][T30957] __x64_sys_setsockopt+0x66/0x80 [ 536.029714][T30957] x64_sys_call+0x282e/0x2dc0 [ 536.029749][T30957] do_syscall_64+0xc9/0x1c0 [ 536.029892][T30957] ? clear_bhb_loop+0x55/0xb0 [ 536.029927][T30957] ? clear_bhb_loop+0x55/0xb0 [ 536.029960][T30957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 536.030095][T30957] RIP: 0033:0x7f0a774cd169 [ 536.030115][T30957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.030139][T30957] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 536.030162][T30957] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 536.030208][T30957] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000006 [ 536.030223][T30957] RBP: 00007f0a75b31090 R08: 0000000000000580 R09: 0000000000000000 [ 536.030239][T30957] R10: 0000400000000580 R11: 0000000000000246 R12: 0000000000000001 [ 536.030254][T30957] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 536.030277][T30957] [ 536.596412][T30976] dccp_invalid_packet: P.Data Offset(172) too large [ 536.687961][T30998] xt_CT: No such helper "pptp" [ 536.752575][T31005] wireguard0: entered promiscuous mode [ 536.758099][T31005] wireguard0: entered allmulticast mode [ 536.811731][T31010] FAULT_INJECTION: forcing a failure. [ 536.811731][T31010] name failslab, interval 1, probability 0, space 0, times 0 [ 536.824557][T31010] CPU: 1 UID: 0 PID: 31010 Comm: syz.6.10462 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 536.824588][T31010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 536.824656][T31010] Call Trace: [ 536.824663][T31010] [ 536.824713][T31010] dump_stack_lvl+0xf2/0x150 [ 536.824747][T31010] dump_stack+0x15/0x1a [ 536.824774][T31010] should_fail_ex+0x24a/0x260 [ 536.824860][T31010] should_failslab+0x8f/0xb0 [ 536.824934][T31010] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 536.824961][T31010] ? __d_alloc+0x3d/0x350 [ 536.824982][T31010] __d_alloc+0x3d/0x350 [ 536.825029][T31010] ? __rcu_read_unlock+0x34/0x70 [ 536.825058][T31010] d_alloc_parallel+0x54/0xc80 [ 536.825081][T31010] ? selinux_inode_permission+0x341/0x410 [ 536.825165][T31010] ? lockref_get_not_dead+0x117/0x1b0 [ 536.825190][T31010] ? __rcu_read_unlock+0x4e/0x70 [ 536.825250][T31010] ? down_read+0x171/0x4b0 [ 536.825277][T31010] __lookup_slow+0x8d/0x250 [ 536.825306][T31010] lookup_slow+0x3c/0x60 [ 536.825326][T31010] walk_component+0x1f5/0x230 [ 536.825390][T31010] ? path_lookupat+0xfd/0x2b0 [ 536.825415][T31010] path_lookupat+0x10a/0x2b0 [ 536.825442][T31010] filename_lookup+0x150/0x340 [ 536.825495][T31010] ? __pfx_resume_store+0x10/0x10 [ 536.825520][T31010] kern_path+0x39/0x120 [ 536.825544][T31010] lookup_bdev+0x62/0x140 [ 536.825752][T31010] resume_store+0x10a/0x3a0 [ 536.825773][T31010] ? _copy_from_iter+0x169/0xd00 [ 536.825816][T31010] ? kstrtouint+0x77/0xc0 [ 536.825845][T31010] ? should_fail_ex+0xd7/0x260 [ 536.825878][T31010] kobj_attr_store+0x47/0x70 [ 536.825915][T31010] ? __pfx_kobj_attr_store+0x10/0x10 [ 536.825943][T31010] sysfs_kf_write+0xae/0xd0 [ 536.825967][T31010] ? __pfx_sysfs_kf_write+0x10/0x10 [ 536.825987][T31010] kernfs_fop_write_iter+0x1c8/0x2c0 [ 536.826021][T31010] vfs_write+0x77b/0x920 [ 536.826060][T31010] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 536.826101][T31010] ksys_write+0xe8/0x1b0 [ 536.826143][T31010] __x64_sys_write+0x42/0x50 [ 536.826172][T31010] x64_sys_call+0x287e/0x2dc0 [ 536.826221][T31010] do_syscall_64+0xc9/0x1c0 [ 536.826258][T31010] ? clear_bhb_loop+0x55/0xb0 [ 536.826285][T31010] ? clear_bhb_loop+0x55/0xb0 [ 536.826311][T31010] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 536.826342][T31010] RIP: 0033:0x7f0a774cd169 [ 536.826416][T31010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.826482][T31010] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 536.826500][T31010] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 536.826514][T31010] RDX: 0000000000000012 RSI: 0000400000000000 RDI: 0000000000000003 [ 536.826529][T31010] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 536.826544][T31010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.826628][T31010] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 536.826651][T31010] [ 537.123543][T31010] block device autoloading is deprecated and will be removed. [ 537.131326][T31010] syz.6.10462: attempt to access beyond end of device [ 537.131326][T31010] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 537.183715][T31016] usb usb1: usbfs: process 31016 (syz.5.10465) did not claim interface 0 before use [ 537.310847][T31020] loop0: detected capacity change from 0 to 512 [ 537.337739][T31019] FAULT_INJECTION: forcing a failure. [ 537.337739][T31019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.350942][T31019] CPU: 1 UID: 0 PID: 31019 Comm: syz.6.10467 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 537.350969][T31019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 537.350988][T31019] Call Trace: [ 537.350997][T31019] [ 537.351006][T31019] dump_stack_lvl+0xf2/0x150 [ 537.351039][T31019] dump_stack+0x15/0x1a [ 537.351060][T31019] should_fail_ex+0x24a/0x260 [ 537.351102][T31019] should_fail+0xb/0x10 [ 537.351134][T31019] should_fail_usercopy+0x1a/0x20 [ 537.351170][T31019] _copy_to_iter+0x248/0xd00 [ 537.351256][T31019] copy_page_to_iter+0x171/0x2b0 [ 537.351288][T31019] shmem_file_read_iter+0x2c1/0x540 [ 537.351339][T31019] do_iter_readv_writev+0x403/0x4b0 [ 537.351413][T31019] vfs_readv+0x1df/0x660 [ 537.351441][T31019] __x64_sys_preadv+0xf4/0x1c0 [ 537.351473][T31019] x64_sys_call+0x2680/0x2dc0 [ 537.351505][T31019] do_syscall_64+0xc9/0x1c0 [ 537.351541][T31019] ? clear_bhb_loop+0x55/0xb0 [ 537.351619][T31019] ? clear_bhb_loop+0x55/0xb0 [ 537.351652][T31019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 537.351686][T31019] RIP: 0033:0x7f0a774cd169 [ 537.351725][T31019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.351749][T31019] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 537.351771][T31019] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 537.351783][T31019] RDX: 10000000000002a9 RSI: 00004000000015c0 RDI: 0000000000000005 [ 537.351795][T31019] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 537.351866][T31019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.351895][T31019] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 537.351916][T31019] [ 537.363673][T31031] xt_CT: No such helper "pptp" [ 537.537595][T31020] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 537.550607][T31020] ext4 filesystem being mounted at /347/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 537.599586][T31020] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10463: corrupted inode contents [ 537.612206][T31020] EXT4-fs error (device loop0): ext4_dirty_inode:6042: inode #2: comm syz.0.10463: mark_inode_dirty error [ 537.632629][T31020] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10463: corrupted inode contents [ 537.650990][T31020] EXT4-fs error (device loop0): __ext4_ext_dirty:207: inode #2: comm syz.0.10463: mark_inode_dirty error [ 537.667648][T31041] SELinux: security_context_str_to_sid (u) failed with errno=-22 [ 537.707278][T31047] usb usb1: usbfs: process 31047 (syz.5.10473) did not claim interface 0 before use [ 537.777052][T31052] SELinux: syz.5.10476 (31052) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 537.883607][T31064] atomic_op ffff88817d738928 conn xmit_atomic 0000000000000000 [ 537.951214][T31070] xt_CT: No such helper "pptp" [ 538.098504][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 538.124960][T31081] hub 4-0:1.0: USB hub found [ 538.129876][T31081] hub 4-0:1.0: 8 ports detected [ 538.210092][T31083] dccp_invalid_packet: P.Data Offset(172) too large [ 538.219787][T31083] loop0: detected capacity change from 0 to 512 [ 538.229306][T31083] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 538.242108][T31083] ext4 filesystem being mounted at /348/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 538.254478][T31083] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10487: corrupted inode contents [ 538.267204][T31083] EXT4-fs error (device loop0): ext4_dirty_inode:6042: inode #2: comm syz.0.10487: mark_inode_dirty error [ 538.279129][T31083] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10487: corrupted inode contents [ 538.291462][T31083] EXT4-fs error (device loop0): __ext4_ext_dirty:207: inode #2: comm syz.0.10487: mark_inode_dirty error [ 538.376718][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 538.582678][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 538.582696][ T29] audit: type=1400 audit(2000262873.901:32487): avc: denied { recv } for pid=28052 comm="syz-executor" saddr=10.128.0.163 src=30030 daddr=10.128.0.116 dest=40836 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 538.614948][ T29] audit: type=1400 audit(2000262873.910:32488): avc: denied { map_create } for pid=31096 comm="syz.7.10492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 538.634871][ T29] audit: type=1400 audit(2000262873.910:32489): avc: denied { perfmon } for pid=31096 comm="syz.7.10492" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 538.656046][ T29] audit: type=1400 audit(2000262873.910:32490): avc: denied { map_read map_write } for pid=31096 comm="syz.7.10492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 538.676299][ T29] audit: type=1400 audit(2000262873.910:32491): avc: denied { prog_load } for pid=31096 comm="syz.7.10492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 538.685153][T31102] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 538.695765][ T29] audit: type=1400 audit(2000262873.910:32492): avc: denied { bpf } for pid=31096 comm="syz.7.10492" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 538.724695][ T29] audit: type=1400 audit(2000262873.947:32493): avc: denied { prog_run } for pid=31098 comm="syz.7.10493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 538.746095][ T29] audit: type=1400 audit(2000262874.032:32494): avc: denied { create } for pid=31098 comm="syz.7.10493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 538.767032][ T29] audit: type=1400 audit(2000262874.032:32495): avc: denied { create } for pid=31098 comm="syz.7.10493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 538.787334][ T29] audit: type=1400 audit(2000262874.041:32496): avc: denied { ioctl } for pid=31098 comm="syz.7.10493" path="socket:[107554]" dev="sockfs" ino=107554 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 538.830379][T31105] xt_CT: No such helper "pptp" [ 538.997534][T31131] usb usb1: usbfs: process 31131 (syz.4.10505) did not claim interface 0 before use [ 539.186154][T31140] xt_hashlimit: max too large, truncated to 1048576 [ 539.195936][T31140] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 539.455184][T31146] xt_CT: No such helper "pptp" [ 539.561506][T31151] loop0: detected capacity change from 0 to 164 [ 539.581408][T31151] Unable to read rock-ridge attributes [ 539.604511][T31151] Unable to read rock-ridge attributes [ 539.666917][T31153] FAULT_INJECTION: forcing a failure. [ 539.666917][T31153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.680121][T31153] CPU: 1 UID: 0 PID: 31153 Comm: syz.0.10512 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 539.680153][T31153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 539.680228][T31153] Call Trace: [ 539.680238][T31153] [ 539.680248][T31153] dump_stack_lvl+0xf2/0x150 [ 539.680282][T31153] dump_stack+0x15/0x1a [ 539.680310][T31153] should_fail_ex+0x24a/0x260 [ 539.680364][T31153] should_fail+0xb/0x10 [ 539.680390][T31153] should_fail_usercopy+0x1a/0x20 [ 539.680423][T31153] _copy_from_user+0x1c/0xa0 [ 539.680468][T31153] kstrtouint_from_user+0x76/0xe0 [ 539.680500][T31153] ? 0xffffffff81000000 [ 539.680524][T31153] ? selinux_file_permission+0x22a/0x360 [ 539.680561][T31153] proc_fail_nth_write+0x4f/0x150 [ 539.680603][T31153] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 539.680729][T31153] vfs_write+0x27d/0x920 [ 539.680821][T31153] ? __fget_files+0x17c/0x1c0 [ 539.680975][T31153] ksys_write+0xe8/0x1b0 [ 539.681003][T31153] __x64_sys_write+0x42/0x50 [ 539.681035][T31153] x64_sys_call+0x287e/0x2dc0 [ 539.681068][T31153] do_syscall_64+0xc9/0x1c0 [ 539.681107][T31153] ? clear_bhb_loop+0x55/0xb0 [ 539.681140][T31153] ? clear_bhb_loop+0x55/0xb0 [ 539.681173][T31153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 539.681206][T31153] RIP: 0033:0x7f1aa6d0bc1f [ 539.681247][T31153] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 539.681346][T31153] RSP: 002b:00007f1aa5377030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 539.681369][T31153] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1aa6d0bc1f [ 539.681435][T31153] RDX: 0000000000000001 RSI: 00007f1aa53770a0 RDI: 0000000000000007 [ 539.681447][T31153] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 539.681459][T31153] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 539.681473][T31153] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 539.681501][T31153] [ 539.998696][T31162] usb usb1: usbfs: process 31162 (syz.7.10516) did not claim interface 0 before use [ 540.021513][T31163] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10517'. [ 540.082400][T31167] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 540.219374][T31173] xt_CT: No such helper "pptp" [ 540.301144][T31180] netlink: 'syz.5.10524': attribute type 1 has an invalid length. [ 540.309112][T31180] netlink: 'syz.5.10524': attribute type 2 has an invalid length. [ 540.625190][T31198] FAULT_INJECTION: forcing a failure. [ 540.625190][T31198] name failslab, interval 1, probability 0, space 0, times 0 [ 540.637959][T31198] CPU: 1 UID: 0 PID: 31198 Comm: syz.6.10529 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 540.638041][T31198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 540.638053][T31198] Call Trace: [ 540.638060][T31198] [ 540.638068][T31198] dump_stack_lvl+0xf2/0x150 [ 540.638097][T31198] dump_stack+0x15/0x1a [ 540.638123][T31198] should_fail_ex+0x24a/0x260 [ 540.638154][T31198] should_failslab+0x8f/0xb0 [ 540.638258][T31198] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 540.638282][T31198] ? __d_alloc+0x3d/0x350 [ 540.638304][T31198] __d_alloc+0x3d/0x350 [ 540.638322][T31198] ? __rcu_read_unlock+0x34/0x70 [ 540.638364][T31198] d_alloc_parallel+0x54/0xc80 [ 540.638387][T31198] ? selinux_inode_permission+0x341/0x410 [ 540.638428][T31198] ? lockref_get_not_dead+0x117/0x1b0 [ 540.638470][T31198] ? __rcu_read_unlock+0x4e/0x70 [ 540.638497][T31198] ? down_read+0x171/0x4b0 [ 540.638525][T31198] __lookup_slow+0x8d/0x250 [ 540.638547][T31198] lookup_slow+0x3c/0x60 [ 540.638572][T31198] walk_component+0x1f5/0x230 [ 540.638638][T31198] ? path_lookupat+0xfd/0x2b0 [ 540.638657][T31198] path_lookupat+0x10a/0x2b0 [ 540.638678][T31198] filename_lookup+0x150/0x340 [ 540.638708][T31198] user_path_at+0x3c/0x120 [ 540.638742][T31198] __se_sys_inotify_add_watch+0x10f/0x790 [ 540.638775][T31198] ? fput+0x1c4/0x200 [ 540.638799][T31198] ? ksys_write+0x176/0x1b0 [ 540.638900][T31198] __x64_sys_inotify_add_watch+0x43/0x50 [ 540.638939][T31198] x64_sys_call+0x1f6d/0x2dc0 [ 540.638972][T31198] do_syscall_64+0xc9/0x1c0 [ 540.639009][T31198] ? clear_bhb_loop+0x55/0xb0 [ 540.639047][T31198] ? clear_bhb_loop+0x55/0xb0 [ 540.639080][T31198] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 540.639113][T31198] RIP: 0033:0x7f0a774cd169 [ 540.639130][T31198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.639189][T31198] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fe [ 540.639207][T31198] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 540.639219][T31198] RDX: 0000000000000201 RSI: 0000400000000040 RDI: 0000000000000007 [ 540.639230][T31198] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 540.639245][T31198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.639259][T31198] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 540.639280][T31198] [ 541.019328][T31201] loop0: detected capacity change from 0 to 256 [ 541.052579][T31201] usb usb1: usbfs: process 31201 (syz.0.10530) did not claim interface 0 before use [ 541.058716][T31203] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 541.125124][T31206] tmpfs: Bad value for 'mpol' [ 541.233102][T31211] xt_CT: No such helper "pptp" [ 541.780460][T31228] dccp_invalid_packet: P.Data Offset(172) too large [ 541.799118][T31228] loop0: detected capacity change from 0 to 512 [ 541.833805][T31228] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 541.860182][T31228] ext4 filesystem being mounted at /363/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 541.891345][T31228] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10539: corrupted inode contents [ 541.940403][T31228] EXT4-fs error (device loop0): ext4_dirty_inode:6042: inode #2: comm syz.0.10539: mark_inode_dirty error [ 541.978483][T31228] EXT4-fs error (device loop0): ext4_do_update_inode:5154: inode #2: comm syz.0.10539: corrupted inode contents [ 542.025678][T31228] EXT4-fs error (device loop0): __ext4_ext_dirty:207: inode #2: comm syz.0.10539: mark_inode_dirty error [ 542.222815][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 542.295283][T31241] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 542.696102][T31261] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10550'. [ 542.729183][T31261] syz_tun: entered promiscuous mode [ 542.742410][T31261] loop0: detected capacity change from 0 to 512 [ 542.776435][T31261] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.10550: bg 0: block 248: padding at end of block bitmap is not set [ 542.802009][T31261] EXT4-fs error (device loop0): ext4_acquire_dquot:6927: comm syz.0.10550: Failed to acquire dquot type 1 [ 542.836265][T31261] EXT4-fs (loop0): 1 truncate cleaned up [ 542.842453][T31261] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 542.859588][T31261] ext4 filesystem being mounted at /367/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 542.875004][T31259] syz_tun: left promiscuous mode [ 542.912235][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 543.043424][T31272] FAULT_INJECTION: forcing a failure. [ 543.043424][T31272] name failslab, interval 1, probability 0, space 0, times 0 [ 543.056226][T31272] CPU: 0 UID: 0 PID: 31272 Comm: syz.7.10554 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 543.056258][T31272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 543.056287][T31272] Call Trace: [ 543.056294][T31272] [ 543.056302][T31272] dump_stack_lvl+0xf2/0x150 [ 543.056336][T31272] dump_stack+0x15/0x1a [ 543.056391][T31272] should_fail_ex+0x24a/0x260 [ 543.056427][T31272] should_failslab+0x8f/0xb0 [ 543.056461][T31272] kmem_cache_alloc_noprof+0x52/0x320 [ 543.056531][T31272] ? getname_flags+0x81/0x3b0 [ 543.056570][T31272] ? __rcu_read_unlock+0x4e/0x70 [ 543.056595][T31272] getname_flags+0x81/0x3b0 [ 543.056702][T31272] getname+0x17/0x20 [ 543.056740][T31272] io_renameat_prep+0xff/0x1a0 [ 543.056778][T31272] io_submit_sqes+0x608/0x1070 [ 543.056827][T31272] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 543.056924][T31272] ? 0xffffffff81000000 [ 543.056940][T31272] ? __rcu_read_unlock+0x4e/0x70 [ 543.056965][T31272] ? get_pid_task+0x8e/0xc0 [ 543.057003][T31272] ? proc_fail_nth_write+0x12a/0x150 [ 543.057038][T31272] ? bpf_perf_event_read+0x124/0x140 [ 543.057077][T31272] ? __rcu_read_unlock+0x4e/0x70 [ 543.057117][T31272] ? bpf_trace_run2+0x123/0x1d0 [ 543.057150][T31272] ? __bpf_trace_sys_enter+0x10/0x30 [ 543.057173][T31272] ? trace_sys_enter+0xcd/0x110 [ 543.057196][T31272] __x64_sys_io_uring_enter+0x78/0x90 [ 543.057252][T31272] x64_sys_call+0xb5e/0x2dc0 [ 543.057283][T31272] do_syscall_64+0xc9/0x1c0 [ 543.057316][T31272] ? clear_bhb_loop+0x55/0xb0 [ 543.057343][T31272] ? clear_bhb_loop+0x55/0xb0 [ 543.057482][T31272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.057515][T31272] RIP: 0033:0x7f7a8d59d169 [ 543.057531][T31272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.057549][T31272] RSP: 002b:00007f7a8bc07038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 543.057570][T31272] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59d169 [ 543.057585][T31272] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000b [ 543.057610][T31272] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000001000000 [ 543.057622][T31272] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 543.057633][T31272] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 543.057652][T31272] [ 543.320982][T31276] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 543.356461][T31278] veth1_to_team: entered promiscuous mode [ 543.547384][T31278] team0: Port device team_slave_1 removed [ 543.728544][T31297] FAULT_INJECTION: forcing a failure. [ 543.728544][T31297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 543.741667][T31297] CPU: 0 UID: 0 PID: 31297 Comm: syz.0.10564 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 543.741699][T31297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 543.741714][T31297] Call Trace: [ 543.741742][T31297] [ 543.741751][T31297] dump_stack_lvl+0xf2/0x150 [ 543.741785][T31297] dump_stack+0x15/0x1a [ 543.741806][T31297] should_fail_ex+0x24a/0x260 [ 543.741893][T31297] should_fail+0xb/0x10 [ 543.741988][T31297] should_fail_usercopy+0x1a/0x20 [ 543.742018][T31297] strncpy_from_user+0x25/0x210 [ 543.742045][T31297] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 543.742068][T31297] ? getname_flags+0x81/0x3b0 [ 543.742200][T31297] getname_flags+0xb0/0x3b0 [ 543.742242][T31297] __x64_sys_link+0x33/0x70 [ 543.742273][T31297] x64_sys_call+0x2d1a/0x2dc0 [ 543.742344][T31297] do_syscall_64+0xc9/0x1c0 [ 543.742376][T31297] ? clear_bhb_loop+0x55/0xb0 [ 543.742403][T31297] ? clear_bhb_loop+0x55/0xb0 [ 543.742429][T31297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.742523][T31297] RIP: 0033:0x7f1aa6d0d169 [ 543.742539][T31297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.742556][T31297] RSP: 002b:00007f1aa5377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 543.742575][T31297] RAX: ffffffffffffffda RBX: 00007f1aa6f25fa0 RCX: 00007f1aa6d0d169 [ 543.742587][T31297] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000400000000080 [ 543.742599][T31297] RBP: 00007f1aa5377090 R08: 0000000000000000 R09: 0000000000000000 [ 543.742663][T31297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.742674][T31297] R13: 0000000000000000 R14: 00007f1aa6f25fa0 R15: 00007ffce67149a8 [ 543.742692][T31297] [ 543.989852][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 543.989869][ T29] audit: type=1400 audit(2000262878.952:32638): avc: denied { ioctl } for pid=31300 comm="syz.0.10566" path="socket:[108610]" dev="sockfs" ino=108610 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.993789][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.088162][ T29] audit: type=1400 audit(2000262879.027:32639): avc: denied { execmem } for pid=31305 comm="syz.5.10568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 544.161269][T31312] loop0: detected capacity change from 0 to 256 [ 544.174380][T31312] usb usb1: usbfs: process 31312 (syz.0.10570) did not claim interface 0 before use [ 544.187385][ T29] audit: type=1400 audit(2000262879.130:32640): avc: denied { mount } for pid=31310 comm="syz.0.10570" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 544.209954][ T29] audit: type=1400 audit(2000262879.130:32641): avc: denied { write } for pid=31310 comm="syz.0.10570" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 544.241410][ T29] audit: type=1400 audit(2000262879.195:32642): avc: denied { cpu } for pid=31305 comm="syz.5.10568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 544.262200][ T29] audit: type=1400 audit(2000262879.195:32643): avc: denied { read } for pid=31310 comm="syz.0.10570" name="event3" dev="devtmpfs" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 544.285894][ T29] audit: type=1400 audit(2000262879.195:32644): avc: denied { open } for pid=31310 comm="syz.0.10570" path="/dev/input/event3" dev="devtmpfs" ino=256 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 544.313670][ T29] audit: type=1400 audit(2000262879.242:32645): avc: denied { ioctl } for pid=31305 comm="syz.5.10568" path="socket:[108618]" dev="sockfs" ino=108618 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 544.339935][ T29] audit: type=1400 audit(2000262879.242:32646): avc: denied { module_request } for pid=31305 comm="syz.5.10568" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 544.362543][ T29] audit: type=1400 audit(2000262879.251:32647): avc: denied { sys_module } for pid=31305 comm="syz.5.10568" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 544.538804][T31330] syz_tun: entered promiscuous mode [ 544.556735][T31330] loop0: detected capacity change from 0 to 512 [ 544.575770][T31332] FAULT_INJECTION: forcing a failure. [ 544.575770][T31332] name failslab, interval 1, probability 0, space 0, times 0 [ 544.588793][T31332] CPU: 1 UID: 0 PID: 31332 Comm: syz.6.10577 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 544.588825][T31332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 544.588840][T31332] Call Trace: [ 544.588848][T31332] [ 544.588856][T31332] dump_stack_lvl+0xf2/0x150 [ 544.588886][T31332] dump_stack+0x15/0x1a [ 544.588913][T31332] should_fail_ex+0x24a/0x260 [ 544.589025][T31332] should_failslab+0x8f/0xb0 [ 544.589064][T31332] kmem_cache_alloc_node_noprof+0x59/0x320 [ 544.589102][T31332] ? __alloc_skb+0x10b/0x310 [ 544.589125][T31332] __alloc_skb+0x10b/0x310 [ 544.589150][T31332] netlink_alloc_large_skb+0xad/0xe0 [ 544.589239][T31332] netlink_sendmsg+0x3b4/0x6e0 [ 544.589279][T31332] ? __pfx_netlink_sendmsg+0x10/0x10 [ 544.589373][T31332] __sock_sendmsg+0x140/0x180 [ 544.589412][T31332] ____sys_sendmsg+0x326/0x4b0 [ 544.589444][T31332] __sys_sendmsg+0x19d/0x230 [ 544.589480][T31332] __x64_sys_sendmsg+0x46/0x50 [ 544.589559][T31332] x64_sys_call+0x2734/0x2dc0 [ 544.589692][T31332] do_syscall_64+0xc9/0x1c0 [ 544.589730][T31332] ? clear_bhb_loop+0x55/0xb0 [ 544.589762][T31332] ? clear_bhb_loop+0x55/0xb0 [ 544.589793][T31332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.589900][T31332] RIP: 0033:0x7f0a774cd169 [ 544.590000][T31332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.590018][T31332] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 544.590107][T31332] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 544.590119][T31332] RDX: 0000000000000000 RSI: 0000400000000580 RDI: 0000000000000003 [ 544.590133][T31332] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 544.590148][T31332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 544.590162][T31332] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 544.590181][T31332] [ 544.593849][T31330] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.10576: bg 0: block 248: padding at end of block bitmap is not set [ 544.809332][T31330] EXT4-fs error (device loop0): ext4_acquire_dquot:6927: comm syz.0.10576: Failed to acquire dquot type 1 [ 544.822238][T31330] EXT4-fs (loop0): 1 truncate cleaned up [ 544.831232][T31330] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 544.846431][T31330] ext4 filesystem being mounted at /382/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 544.861354][T31329] syz_tun: left promiscuous mode [ 544.869508][T31345] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 544.893777][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 544.955125][T31351] usb usb1: usbfs: process 31351 (syz.7.10584) did not claim interface 0 before use [ 545.021947][T31353] loop0: detected capacity change from 0 to 512 [ 545.029257][T31353] EXT4-fs: Ignoring removed mblk_io_submit option [ 545.038165][T31353] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=b856c118, mo2=0002] [ 545.046195][T31353] System zones: 1-12 [ 545.050566][T31353] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.10582: corrupted in-inode xattr: e_value size too large [ 545.061628][T31356] netlink: 20 bytes leftover after parsing attributes in process `syz.4.10586'. [ 545.081809][T31353] EXT4-fs error (device loop0): ext4_orphan_get:1394: comm syz.0.10582: couldn't read orphan inode 15 (err -117) [ 545.097230][T31353] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 545.293742][T31370] syz_tun: entered promiscuous mode [ 545.310984][T31372] vcan0: tx drop: invalid sa for name 0x0000000000000004 [ 545.335462][T31369] syz_tun: left promiscuous mode [ 545.460184][T31381] usb usb1: usbfs: process 31381 (syz.4.10597) did not claim interface 0 before use [ 545.557983][T31392] netlink: 24 bytes leftover after parsing attributes in process `syz.4.10598'. [ 545.602448][T31397] FAULT_INJECTION: forcing a failure. [ 545.602448][T31397] name failslab, interval 1, probability 0, space 0, times 0 [ 545.615819][T31397] CPU: 1 UID: 0 PID: 31397 Comm: syz.6.10601 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 545.615875][T31397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 545.615890][T31397] Call Trace: [ 545.615899][T31397] [ 545.615909][T31397] dump_stack_lvl+0xf2/0x150 [ 545.615954][T31397] dump_stack+0x15/0x1a [ 545.615975][T31397] should_fail_ex+0x24a/0x260 [ 545.616009][T31397] should_failslab+0x8f/0xb0 [ 545.616073][T31397] __kmalloc_noprof+0xab/0x3f0 [ 545.616099][T31397] ? devlink_nl_notify_filter_set_doit+0xad/0x2a0 [ 545.616207][T31397] devlink_nl_notify_filter_set_doit+0xad/0x2a0 [ 545.616245][T31397] genl_rcv_msg+0x620/0x6d0 [ 545.616274][T31397] ? __pfx_devlink_nl_notify_filter_set_doit+0x10/0x10 [ 545.616313][T31397] ? should_fail_ex+0x31/0x260 [ 545.616396][T31397] netlink_rcv_skb+0x12c/0x230 [ 545.616436][T31397] ? __pfx_genl_rcv_msg+0x10/0x10 [ 545.616537][T31397] genl_rcv+0x28/0x40 [ 545.616561][T31397] netlink_unicast+0x599/0x670 [ 545.616661][T31397] netlink_sendmsg+0x5cc/0x6e0 [ 545.616751][T31397] ? __pfx_netlink_sendmsg+0x10/0x10 [ 545.616847][T31397] __sock_sendmsg+0x140/0x180 [ 545.616885][T31397] ____sys_sendmsg+0x326/0x4b0 [ 545.616959][T31397] __sys_sendmsg+0x19d/0x230 [ 545.617007][T31397] __x64_sys_sendmsg+0x46/0x50 [ 545.617083][T31397] x64_sys_call+0x2734/0x2dc0 [ 545.617117][T31397] do_syscall_64+0xc9/0x1c0 [ 545.617154][T31397] ? clear_bhb_loop+0x55/0xb0 [ 545.617186][T31397] ? clear_bhb_loop+0x55/0xb0 [ 545.617233][T31397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 545.617260][T31397] RIP: 0033:0x7f0a774cd169 [ 545.617282][T31397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.617309][T31397] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 545.617332][T31397] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 545.617348][T31397] RDX: 0000000000000000 RSI: 00004000000006c0 RDI: 0000000000000005 [ 545.617407][T31397] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 545.617422][T31397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.617493][T31397] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 545.617514][T31397] [ 545.618424][T31392] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10598'. [ 545.883350][T31404] FAULT_INJECTION: forcing a failure. [ 545.883350][T31404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 545.896533][T31404] CPU: 0 UID: 0 PID: 31404 Comm: syz.7.10604 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 545.896565][T31404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 545.896613][T31404] Call Trace: [ 545.896621][T31404] [ 545.896629][T31404] dump_stack_lvl+0xf2/0x150 [ 545.896664][T31404] dump_stack+0x15/0x1a [ 545.896769][T31404] should_fail_ex+0x24a/0x260 [ 545.896806][T31404] should_fail+0xb/0x10 [ 545.896838][T31404] should_fail_usercopy+0x1a/0x20 [ 545.896903][T31404] _copy_from_user+0x1c/0xa0 [ 545.896938][T31404] copy_msghdr_from_user+0x54/0x2a0 [ 545.897051][T31404] ? __fget_files+0x17c/0x1c0 [ 545.897094][T31404] __sys_sendmsg+0x13e/0x230 [ 545.897137][T31404] __x64_sys_sendmsg+0x46/0x50 [ 545.897202][T31404] x64_sys_call+0x2734/0x2dc0 [ 545.897241][T31404] do_syscall_64+0xc9/0x1c0 [ 545.897278][T31404] ? clear_bhb_loop+0x55/0xb0 [ 545.897386][T31404] ? clear_bhb_loop+0x55/0xb0 [ 545.897486][T31404] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 545.897599][T31404] RIP: 0033:0x7f7a8d59d169 [ 545.897616][T31404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.897634][T31404] RSP: 002b:00007f7a8bc07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 545.897652][T31404] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59d169 [ 545.897727][T31404] RDX: 0000000000000000 RSI: 00004000000000c0 RDI: 0000000000000003 [ 545.897742][T31404] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 545.897757][T31404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 545.897771][T31404] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 545.897794][T31404] [ 546.122001][T31410] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10607'. [ 546.149707][T31410] syz_tun: entered promiscuous mode [ 546.160255][T31409] syz_tun: left promiscuous mode [ 546.195010][T31412] usb usb1: usbfs: process 31412 (syz.6.10608) did not claim interface 0 before use [ 546.206400][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 546.384782][T31421] netlink: 12 bytes leftover after parsing attributes in process `syz.6.10612'. [ 546.413838][T31421] vlan2: entered promiscuous mode [ 546.963934][T31439] netlink: 24 bytes leftover after parsing attributes in process `syz.6.10619'. [ 546.974575][T31439] syz_tun: entered promiscuous mode [ 546.980937][T31438] syz_tun: left promiscuous mode [ 547.027432][T31443] usb usb1: usbfs: process 31443 (syz.6.10621) did not claim interface 0 before use [ 547.103218][T31449] sch_tbf: burst 25 is lower than device lo mtu (65550) ! [ 547.375943][T31466] netlink: 24 bytes leftover after parsing attributes in process `syz.0.10631'. [ 547.405363][T31466] syz_tun: entered promiscuous mode [ 547.416665][T31465] syz_tun: left promiscuous mode [ 547.526658][T31472] loop0: detected capacity change from 0 to 256 [ 547.552524][T31472] usb usb1: usbfs: process 31472 (syz.0.10634) did not claim interface 0 before use [ 547.697443][T31494] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 548.372402][T31539] xt_CT: No such helper "pptp" [ 548.584968][T31552] FAULT_INJECTION: forcing a failure. [ 548.584968][T31552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.598562][T31552] CPU: 0 UID: 0 PID: 31552 Comm: syz.4.10658 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 548.598592][T31552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 548.598608][T31552] Call Trace: [ 548.598616][T31552] [ 548.598625][T31552] dump_stack_lvl+0xf2/0x150 [ 548.598668][T31552] dump_stack+0x15/0x1a [ 548.598695][T31552] should_fail_ex+0x24a/0x260 [ 548.598738][T31552] should_fail+0xb/0x10 [ 548.598781][T31552] should_fail_usercopy+0x1a/0x20 [ 548.598816][T31552] strncpy_from_user+0x25/0x210 [ 548.598841][T31552] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 548.598868][T31552] ? getname_flags+0x81/0x3b0 [ 548.598977][T31552] getname_flags+0xb0/0x3b0 [ 548.599009][T31552] user_path_at+0x26/0x120 [ 548.599041][T31552] __se_sys_mount+0x24b/0x2d0 [ 548.599148][T31552] ? fput+0x1c4/0x200 [ 548.599182][T31552] __x64_sys_mount+0x67/0x80 [ 548.599220][T31552] x64_sys_call+0x2c84/0x2dc0 [ 548.599282][T31552] do_syscall_64+0xc9/0x1c0 [ 548.599311][T31552] ? clear_bhb_loop+0x55/0xb0 [ 548.599405][T31552] ? clear_bhb_loop+0x55/0xb0 [ 548.599435][T31552] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 548.599467][T31552] RIP: 0033:0x7f038b03d169 [ 548.599485][T31552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.599549][T31552] RSP: 002b:00007f03896a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 548.599567][T31552] RAX: ffffffffffffffda RBX: 00007f038b255fa0 RCX: 00007f038b03d169 [ 548.599581][T31552] RDX: 00004000000002c0 RSI: 0000400000000080 RDI: 0000000000000000 [ 548.599596][T31552] RBP: 00007f03896a7090 R08: 0000400000000400 R09: 0000000000000000 [ 548.599611][T31552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.599625][T31552] R13: 0000000000000000 R14: 00007f038b255fa0 R15: 00007ffc5672e628 [ 548.599646][T31552] [ 548.885549][T31562] x_tables: duplicate underflow at hook 2 [ 548.891744][T31562] netlink: 204 bytes leftover after parsing attributes in process `syz.0.10663'. [ 549.213294][T31570] xt_CT: No such helper "pptp" [ 549.340595][T31578] netlink: 348 bytes leftover after parsing attributes in process `syz.5.10668'. [ 549.386949][T31580] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 549.566055][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 549.566165][ T29] audit: type=1400 audit(2000262884.171:32747): avc: denied { unmount } for pid=29757 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 549.576064][T31590] Invalid ELF header magic: != ELF [ 549.592971][ T29] audit: type=1400 audit(2000262884.190:32748): avc: denied { module_load } for pid=31589 comm="syz.5.10673" path="/sys/kernel/notes" dev="sysfs" ino=210 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 549.665275][ T29] audit: type=1400 audit(2000262884.265:32749): avc: denied { sqpoll } for pid=31589 comm="syz.5.10673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 549.794849][T31595] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 549.855829][ T29] audit: type=1400 audit(2000262884.443:32750): avc: denied { setopt } for pid=31596 comm="syz.4.10675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 550.015557][T31601] audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 [ 550.023394][T31601] audit: out of memory in audit_log_start [ 550.037406][ T29] audit: type=1400 audit(2000262884.471:32751): avc: denied { bind } for pid=31596 comm="syz.4.10675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 550.057551][ T29] audit: type=1400 audit(2000262884.583:32752): avc: denied { setopt } for pid=31598 comm="syz.4.10676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 550.124095][T31609] usb usb1: usbfs: process 31609 (syz.4.10680) did not claim interface 0 before use [ 550.215556][T31617] netlink: 76 bytes leftover after parsing attributes in process `syz.4.10684'. [ 550.233195][ T29] audit: type=1400 audit(2000262884.798:32753): avc: denied { map } for pid=31616 comm="syz.4.10684" path="socket:[109085]" dev="sockfs" ino=109085 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 550.280941][T31620] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 550.356837][ T29] audit: type=1400 audit(2000262884.910:32754): avc: denied { name_bind } for pid=31624 comm="syz.4.10688" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 550.383297][T31626] FAULT_INJECTION: forcing a failure. [ 550.383297][T31626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 550.396503][T31626] CPU: 1 UID: 0 PID: 31626 Comm: syz.4.10688 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 550.396547][T31626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 550.396563][T31626] Call Trace: [ 550.396571][T31626] [ 550.396579][T31626] dump_stack_lvl+0xf2/0x150 [ 550.396608][T31626] dump_stack+0x15/0x1a [ 550.396675][T31626] should_fail_ex+0x24a/0x260 [ 550.396705][T31626] should_fail+0xb/0x10 [ 550.396755][T31626] should_fail_usercopy+0x1a/0x20 [ 550.396786][T31626] _copy_from_iter+0xd5/0xd00 [ 550.396842][T31626] ? alloc_pages_mpol+0x208/0x260 [ 550.396868][T31626] copy_page_from_iter+0x14f/0x280 [ 550.396900][T31626] tun_get_user+0x68b/0x25c0 [ 550.396926][T31626] ? avc_has_perm+0xd4/0x160 [ 550.396946][T31626] ? ref_tracker_alloc+0x1f5/0x2f0 [ 550.397031][T31626] tun_chr_write_iter+0x188/0x240 [ 550.397053][T31626] vfs_write+0x77b/0x920 [ 550.397097][T31626] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 550.397122][T31626] ksys_write+0xe8/0x1b0 [ 550.397148][T31626] __x64_sys_write+0x42/0x50 [ 550.397174][T31626] x64_sys_call+0x287e/0x2dc0 [ 550.397262][T31626] do_syscall_64+0xc9/0x1c0 [ 550.397292][T31626] ? clear_bhb_loop+0x55/0xb0 [ 550.397319][T31626] ? clear_bhb_loop+0x55/0xb0 [ 550.397422][T31626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 550.397448][T31626] RIP: 0033:0x7f038b03bc1f [ 550.397473][T31626] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 550.397491][T31626] RSP: 002b:00007f03896a7000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 550.397534][T31626] RAX: ffffffffffffffda RBX: 00007f038b255fa0 RCX: 00007f038b03bc1f [ 550.397546][T31626] RDX: 0000000000000036 RSI: 0000400000000180 RDI: 00000000000000c8 [ 550.397559][T31626] RBP: 00007f03896a7090 R08: 0000000000000000 R09: 0000000000000000 [ 550.397570][T31626] R10: 0000000000000036 R11: 0000000000000293 R12: 0000000000000001 [ 550.397582][T31626] R13: 0000000000000000 R14: 00007f038b255fa0 R15: 00007ffc5672e628 [ 550.397599][T31626] [ 550.664761][T31633] wireguard0: entered promiscuous mode [ 550.670319][T31633] wireguard0: entered allmulticast mode [ 550.713621][T31649] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 550.740981][T31644] netlink: 48 bytes leftover after parsing attributes in process `syz.4.10695'. [ 550.778324][T31658] Invalid ELF header magic: != ELF [ 550.953989][T31680] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 551.058636][T31690] SELinux: ebitmap: truncated map [ 551.064362][T31690] SELinux: failed to load policy [ 551.168912][T31697] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10715'. [ 551.772453][T31719] loop0: detected capacity change from 0 to 512 [ 551.789712][T31719] EXT4-fs (loop0): 1 orphan inode deleted [ 551.796021][T31719] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 551.809148][ T67] EXT4-fs error (device loop0): ext4_release_dquot:6950: comm kworker/u8:4: Failed to release dquot type 1 [ 551.811454][T31719] ext4 filesystem being mounted at /405/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 551.849634][T31717] dccp_invalid_packet: P.Data Offset(172) too large [ 551.870277][T31725] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(7) [ 551.873912][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 551.876880][T31725] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 551.893327][T31725] vhci_hcd vhci_hcd.0: Device attached [ 551.935062][T31726] vhci_hcd: connection closed [ 551.939812][ T68] vhci_hcd: stop threads [ 551.948800][ T68] vhci_hcd: release socket [ 551.953301][ T68] vhci_hcd: disconnect device [ 551.982938][T31738] netlink: 348 bytes leftover after parsing attributes in process `syz.0.10727'. [ 552.002828][T31742] 9pnet_fd: Insufficient options for proto=fd [ 552.036340][T31746] Invalid ELF header magic: != ELF [ 552.044396][T31744] usb usb1: usbfs: process 31744 (syz.7.10730) did not claim interface 0 before use [ 552.594183][T31772] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10740'. [ 552.620572][T31775] 9pnet_fd: Insufficient options for proto=fd [ 553.111025][T31788] loop0: detected capacity change from 0 to 512 [ 553.137172][T31788] EXT4-fs (loop0): 1 orphan inode deleted [ 553.148555][T31788] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 553.162220][ T50] EXT4-fs error (device loop0): ext4_release_dquot:6950: comm kworker/u8:3: Failed to release dquot type 1 [ 553.177586][T31788] ext4 filesystem being mounted at /409/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 553.205439][T27035] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 553.252383][T31797] netlink: 48 bytes leftover after parsing attributes in process `syz.7.10749'. [ 553.269182][T31784] netlink: 20 bytes leftover after parsing attributes in process `syz.4.10744'. [ 553.300412][T31808] 9pnet_fd: Insufficient options for proto=fd [ 553.357996][T31816] netlink: 4 bytes leftover after parsing attributes in process `syz.7.10757'. [ 553.482937][T31832] SELinux: security_context_str_to_sid ({ÿ) failed with errno=-22 [ 553.627857][T31847] usb usb1: usbfs: process 31847 (syz.6.10769) did not claim interface 0 before use [ 553.697249][T31849] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10768'. [ 553.723304][T31851] FAULT_INJECTION: forcing a failure. [ 553.723304][T31851] name failslab, interval 1, probability 0, space 0, times 0 [ 553.736202][T31851] CPU: 1 UID: 0 PID: 31851 Comm: syz.6.10770 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 553.736233][T31851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 553.736245][T31851] Call Trace: [ 553.736252][T31851] [ 553.736260][T31851] dump_stack_lvl+0xf2/0x150 [ 553.736289][T31851] dump_stack+0x15/0x1a [ 553.736355][T31851] should_fail_ex+0x24a/0x260 [ 553.736392][T31851] should_failslab+0x8f/0xb0 [ 553.736440][T31851] kmem_cache_alloc_node_noprof+0x59/0x320 [ 553.736463][T31851] ? __alloc_skb+0x10b/0x310 [ 553.736488][T31851] __alloc_skb+0x10b/0x310 [ 553.736513][T31851] netlink_alloc_large_skb+0xad/0xe0 [ 553.736554][T31851] netlink_sendmsg+0x3b4/0x6e0 [ 553.736679][T31851] ? __pfx_netlink_sendmsg+0x10/0x10 [ 553.736719][T31851] __sock_sendmsg+0x140/0x180 [ 553.736891][T31851] ____sys_sendmsg+0x326/0x4b0 [ 553.736919][T31851] __sys_sendmsg+0x19d/0x230 [ 553.736961][T31851] __x64_sys_sendmsg+0x46/0x50 [ 553.736991][T31851] x64_sys_call+0x2734/0x2dc0 [ 553.737101][T31851] do_syscall_64+0xc9/0x1c0 [ 553.737137][T31851] ? clear_bhb_loop+0x55/0xb0 [ 553.737168][T31851] ? clear_bhb_loop+0x55/0xb0 [ 553.737214][T31851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.737246][T31851] RIP: 0033:0x7f0a774cd169 [ 553.737264][T31851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 553.737356][T31851] RSP: 002b:00007f0a75b31038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 553.737374][T31851] RAX: ffffffffffffffda RBX: 00007f0a776e5fa0 RCX: 00007f0a774cd169 [ 553.737387][T31851] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000000000000006 [ 553.737402][T31851] RBP: 00007f0a75b31090 R08: 0000000000000000 R09: 0000000000000000 [ 553.737416][T31851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 553.737430][T31851] R13: 0000000000000000 R14: 00007f0a776e5fa0 R15: 00007ffdbc5efa68 [ 553.737450][T31851] [ 554.176681][T31863] FAULT_INJECTION: forcing a failure. [ 554.176681][T31863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 554.190027][T31863] CPU: 1 UID: 0 PID: 31863 Comm: syz.7.10775 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 554.190093][T31863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 554.190109][T31863] Call Trace: [ 554.190117][T31863] [ 554.190126][T31863] dump_stack_lvl+0xf2/0x150 [ 554.190159][T31863] dump_stack+0x15/0x1a [ 554.190232][T31863] should_fail_ex+0x24a/0x260 [ 554.190342][T31863] should_fail+0xb/0x10 [ 554.190374][T31863] should_fail_usercopy+0x1a/0x20 [ 554.190470][T31863] strncpy_from_user+0x25/0x210 [ 554.190503][T31863] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 554.190525][T31863] ? getname_flags+0x81/0x3b0 [ 554.190577][T31863] getname_flags+0xb0/0x3b0 [ 554.190610][T31863] user_path_at+0x26/0x120 [ 554.190638][T31863] __se_sys_mount+0x24b/0x2d0 [ 554.190675][T31863] ? fput+0x1c4/0x200 [ 554.190698][T31863] __x64_sys_mount+0x67/0x80 [ 554.190755][T31863] x64_sys_call+0x2c84/0x2dc0 [ 554.190781][T31863] do_syscall_64+0xc9/0x1c0 [ 554.190815][T31863] ? clear_bhb_loop+0x55/0xb0 [ 554.190873][T31863] ? clear_bhb_loop+0x55/0xb0 [ 554.190907][T31863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.190935][T31863] RIP: 0033:0x7f7a8d59d169 [ 554.190972][T31863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 554.190993][T31863] RSP: 002b:00007f7a8bc07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 554.191016][T31863] RAX: ffffffffffffffda RBX: 00007f7a8d7b5fa0 RCX: 00007f7a8d59d169 [ 554.191032][T31863] RDX: 0000000000000000 RSI: 0000400000000140 RDI: 0000000000000000 [ 554.191047][T31863] RBP: 00007f7a8bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 554.191061][T31863] R10: 0000000000000825 R11: 0000000000000246 R12: 0000000000000001 [ 554.191074][T31863] R13: 0000000000000000 R14: 00007f7a8d7b5fa0 R15: 00007ffeace7fcc8 [ 554.191128][T31863] [ 554.535936][ T67] ================================================================== [ 554.544059][ T67] BUG: KCSAN: data-race in n_tty_receive_char_flow_ctrl / tty_set_termios [ 554.552572][ T67] [ 554.554900][ T67] write to 0xffff888116b35922 of 1 bytes by task 31872 on cpu 0: [ 554.562622][ T67] tty_set_termios+0x4c9/0x8b0 [ 554.567397][ T67] set_termios+0x497/0x4e0 [ 554.571857][ T67] tty_mode_ioctl+0x391/0x5d0 [ 554.576545][ T67] n_tty_ioctl_helper+0x8d/0x240 [ 554.581514][ T67] n_tty_ioctl+0xfd/0x200 [ 554.585859][ T67] tty_ioctl+0x87a/0xbe0 [ 554.590122][ T67] __se_sys_ioctl+0xc9/0x140 [ 554.594820][ T67] __x64_sys_ioctl+0x43/0x50 [ 554.599420][ T67] x64_sys_call+0x1690/0x2dc0 [ 554.604109][ T67] do_syscall_64+0xc9/0x1c0 [ 554.608627][ T67] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.614530][ T67] [ 554.616854][ T67] read to 0xffff888116b35922 of 1 bytes by task 67 on cpu 1: [ 554.624220][ T67] n_tty_receive_char_flow_ctrl+0x58/0x1a0 [ 554.630032][ T67] n_tty_lookahead_flow_ctrl+0xee/0x130 [ 554.635598][ T67] tty_port_default_lookahead_buf+0x8a/0xc0 [ 554.641594][ T67] flush_to_ldisc+0x31c/0x410 [ 554.646291][ T67] process_scheduled_works+0x4db/0xa20 [ 554.651759][ T67] worker_thread+0x51d/0x6f0 [ 554.656354][ T67] kthread+0x4ae/0x520 [ 554.660434][ T67] ret_from_fork+0x4b/0x60 [ 554.665296][ T67] ret_from_fork_asm+0x1a/0x30 [ 554.670072][ T67] [ 554.672394][ T67] value changed: 0x13 -> 0x00 [ 554.677065][ T67] [ 554.679384][ T67] Reported by Kernel Concurrency Sanitizer on: [ 554.685531][ T67] CPU: 1 UID: 0 PID: 67 Comm: kworker/u8:4 Not tainted 6.14.0-rc4-syzkaller-00073-g5394eea10651 #0 [ 554.696207][ T67] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 554.706269][ T67] Workqueue: events_unbound flush_to_ldisc [ 554.712104][ T67] ================================================================== [ 554.791864][T31877] usb usb1: usbfs: process 31877 (syz.6.10780) did not claim interface 0 before use [ 554.845017][T31873] 9pnet: Unknown protocol version 9p2000.d [ 558.176467][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog