last executing test programs: 5m26.665296621s ago: executing program 0 (id=1): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4005, &(0x7f0000000040)=0x81, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000340)={0x4, &(0x7f0000000240)=[{0x8, 0x1, 0x6, 0x7fff}, {0x4, 0x2, 0x2, 0xff}, {0x400, 0x4, 0x2, 0x3}, {0x1, 0x1, 0x2, 0x7}]}) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000005640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)="be", 0x7ffff000}, {0x0, 0x141}], 0x2, 0x0, 0x0) 5m26.274410629s ago: executing program 0 (id=14): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x4, 0x7fe2, 0x1, 0x40, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in=@empty, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x3502, 0xa, 0x2}, [@algo_crypt={0x4e, 0x2, {{'ecb(cipher_null)\x00'}, 0x30, "bdc017cf7011"}}]}, 0x140}, 0x1, 0xe}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pI4 \x00'}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25, 0x0, 0xfeff}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000003c0)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x8000}, {0x5, 0x12, 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40050}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="6c603b59a81f3679652ab0ac31446a0e0efd4b32657ff51fca213ab73629d3b32ca539bd3d94a9cd3161ee19598d71c51a0ef07b1f640bbbf91a5f3df46c2ea1b15338d87dd77daec27c30", &(0x7f00000000c0), &(0x7f0000000300)="5b7cc43f0332b69eb81fc42d35b13b85f4cceb71be580ea5db6ef0ca19b4dee6bd8ecaf19a2e96da343277500554d45651690e899352e101503e82aae038da571aea557ebe13a0da057e3038994f4e3ffd677afdf0fe1781c39455317d93b9bf34f9bafc14d0457e280f074533188daabf8a3743ed5bce248bb6a7015c24f9907e9bdc1f854b6deb34f3e5b59051bbd75efb5c4465076a22772f3040b37771", &(0x7f0000000500)="367476b89369b22934379fc219e69604ac3fe549cb507bc16df9ead494a2a696d2bd943d9ad03a6d04c4ca96620b00cf7c9267413a4f14ff3fa71132633217ef220b578a8721b0da62223c5d6cf5ab9e0e4247e8f3e9bb8b5035cae70f431eea2ce371e6a680865a6ed42b98cf698d9aa0b735db0c30368ba2bbd29113ff832c52c608534667c84c968c155a5124a41dda6abeaacf731bb21f53e03789c797e87a887dde9bc6f01b57fc370b7d1014250dc34a7bd5d5a0242459de357ecbf4f64f48f1624b2da84b383a8a320c83606c", 0x9, r3}, 0x38) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 5m23.406671978s ago: executing program 0 (id=48): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x20000801) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 5m22.486909314s ago: executing program 0 (id=54): r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x2, 0x6}}, 0x20) listen(r0, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x93}, [{}, {}, {0x0, 0x0, 0x0, 0x0, 0x7, 0x80000}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8000000}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x200000}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, {0x0, 0x0, 0x200}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x4}, {}, {}, {0x0, 0xfffffffd}, {}, {}, {}, {}, {0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {0x2}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {}, {}, {}, {0x10000000}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x10000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x3}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) 5m21.44692547s ago: executing program 0 (id=57): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8fe00000000bfa200000000000007020000f8ffffffb703000008000000b70400008f2000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x8000, 0x0) 5m20.910954478s ago: executing program 0 (id=58): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x4, 0x7fe2, 0x1, 0x40, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in=@empty, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x3502, 0xa, 0x2}, [@algo_crypt={0x4e, 0x2, {{'ecb(cipher_null)\x00'}, 0x30, "bdc017cf7011"}}]}, 0x140}, 0x1, 0xe}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pI4 \x00'}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25, 0x0, 0xfeff}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r4, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x40050}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="6c603b59a81f3679652ab0ac31446a0e0efd4b32657ff51fca213ab73629d3b32ca539bd3d94a9cd3161ee19598d71c51a0ef07b1f640bbbf91a5f3df46c2ea1b15338d87dd77daec27c30", &(0x7f00000000c0), &(0x7f0000000300)="5b7cc43f0332b69eb81fc42d35b13b85f4cceb71be580ea5db6ef0ca19b4dee6bd8ecaf19a2e96da343277500554d45651690e899352e101503e82aae038da571aea557ebe13a0da057e3038994f4e3ffd677afdf0fe1781c39455317d93b9bf34f9bafc14d0457e280f074533188daabf8a3743ed5bce248bb6a7015c24f9907e9bdc1f854b6deb34f3e5b59051bbd75efb5c4465076a22772f3040b37771", &(0x7f0000000500)="367476b89369b22934379fc219e69604ac3fe549cb507bc16df9ead494a2a696d2bd943d9ad03a6d04c4ca96620b00cf7c9267413a4f14ff3fa71132633217ef220b578a8721b0da62223c5d6cf5ab9e0e4247e8f3e9bb8b5035cae70f431eea2ce371e6a680865a6ed42b98cf698d9aa0b735db0c30368ba2bbd29113ff832c52c608534667c84c968c155a5124a41dda6abeaacf731bb21f53e03789c797e87a887dde9bc6f01b57fc370b7d1014250dc34a7bd5d5a0242459de357ecbf4f64f48f1624b2da84b383a8a320c83606c", 0x9, r3}, 0x38) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 5m5.84107453s ago: executing program 32 (id=58): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x4, 0x7fe2, 0x1, 0x40, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000004c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in=@empty, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x3502, 0xa, 0x2}, [@algo_crypt={0x4e, 0x2, {{'ecb(cipher_null)\x00'}, 0x30, "bdc017cf7011"}}]}, 0x140}, 0x1, 0xe}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pI4 \x00'}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25, 0x0, 0xfeff}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r4, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x40050}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000280)={&(0x7f0000000000)="6c603b59a81f3679652ab0ac31446a0e0efd4b32657ff51fca213ab73629d3b32ca539bd3d94a9cd3161ee19598d71c51a0ef07b1f640bbbf91a5f3df46c2ea1b15338d87dd77daec27c30", &(0x7f00000000c0), &(0x7f0000000300)="5b7cc43f0332b69eb81fc42d35b13b85f4cceb71be580ea5db6ef0ca19b4dee6bd8ecaf19a2e96da343277500554d45651690e899352e101503e82aae038da571aea557ebe13a0da057e3038994f4e3ffd677afdf0fe1781c39455317d93b9bf34f9bafc14d0457e280f074533188daabf8a3743ed5bce248bb6a7015c24f9907e9bdc1f854b6deb34f3e5b59051bbd75efb5c4465076a22772f3040b37771", &(0x7f0000000500)="367476b89369b22934379fc219e69604ac3fe549cb507bc16df9ead494a2a696d2bd943d9ad03a6d04c4ca96620b00cf7c9267413a4f14ff3fa71132633217ef220b578a8721b0da62223c5d6cf5ab9e0e4247e8f3e9bb8b5035cae70f431eea2ce371e6a680865a6ed42b98cf698d9aa0b735db0c30368ba2bbd29113ff832c52c608534667c84c968c155a5124a41dda6abeaacf731bb21f53e03789c797e87a887dde9bc6f01b57fc370b7d1014250dc34a7bd5d5a0242459de357ecbf4f64f48f1624b2da84b383a8a320c83606c", 0x9, r3}, 0x38) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 3m48.585267282s ago: executing program 5 (id=1130): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x9}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d61"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 3m48.584427092s ago: executing program 5 (id=1131): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x275a, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="c0", 0x1}], 0x1) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 3m48.529764941s ago: executing program 5 (id=1133): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000fcdbdf250100000004000180100002800c0001800800010003"], 0x28}}, 0x2000c050) 3m48.491228241s ago: executing program 5 (id=1134): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800e00010000028008000300"/36, @ANYRES32=0x0, @ANYBLOB], 0x40}, 0x1, 0xd}, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000000)) r3 = getuid() getresgid(&(0x7f0000000140), &(0x7f0000000000), &(0x7f0000000240)=0x0) r5 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x10814, &(0x7f0000000340)=ANY=[@ANYBLOB='umask=00000000000000000000000,flush,nodots,dots,gid=', @ANYRESHEX=r4, @ANYBLOB="00006b746769643d0092", @ANYRES16, @ANYBLOB="1500bba7d41fabba4332de3ca642acf6f8de847e3f21783608008708a887d30aaf0a14b0691d48445fe3b4d1ddde1b81337b2c3b5f88535d7f6fa931b84783704494cebe49ca9f6269b05edde0246c360d0566b4056f0f02ccab035d3d0a5cde0b31bd424949fe23c0a0a25691738006c5c6acdf101fecdb4f79abdfb95c6afaea03dd5903b5240565f31504c207a9a2aa6c8108fb973081e90412a3c6cfa3b2513693727fad9acd8108acb8b90fab033c9dac0dc3e5a61c513e7b5edc5d76320f0e54045ea2b7b8fb1f78d3d346e26ee5ed6926cea1ffe0a1"], 0x1, 0x1fa, &(0x7f0000000500)="$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") r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000001780)={{0x1, 0x1, 0x18, r2, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) r8 = getgid() r9 = syz_clone(0x80000, &(0x7f00000017c0)="ec778dad66657498db04518d69e1a64d0a847483923666252b36f312802fc5fd2901c71799dd493019904f5677a41e0208158eced327889ef0b1cee77575894eed7a49dffa48fdb80b2f43d1e03b2e099960d521d63bf28d79857cce2fd8bce969c5bef66378116e1ef77835ba3d6fc7781cd9a0153e886557a3cdc658fb604f9d543a2e8a0876f6a7d4a9f8e744f54c3cce208f5231463df8e80d2960d8", 0x9e, &(0x7f0000001880), &(0x7f00000018c0), &(0x7f0000001900)="d1c3") r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r13}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000080)=0xe8) fstat(r5, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r14, r15) fchown(r11, r12, r15) syz_clone3(&(0x7f0000001c40)={0x1000480, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)=0x0, {0x2a}, &(0x7f0000001a00)=""/208, 0xd0, &(0x7f0000001b00)=""/223, &(0x7f0000001c00)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x4}, 0x58) getresuid(&(0x7f0000001cc0), &(0x7f0000001d00), &(0x7f0000001d40)=0x0) statx(0xffffffffffffffff, &(0x7f00000020c0)='./file0/file0\x00', 0x4000, 0x80, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001ec0), 0x0, 0x0) r20 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001f00), 0x10400, 0x0) r21 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r21, 0x8983, &(0x7f0000000000)={0x2, 'vlan0\x00', {}, 0x41}) sendmsg$netlink(r2, &(0x7f0000002040)={&(0x7f0000000240), 0xc, &(0x7f0000001740)=[{&(0x7f00000002c0)={0x114, 0x20, 0x400, 0x70bd25, 0x25dfdbfe, "", [@generic="6e7d8f506d7f8e9008e60df738565f21af97c702396ae6d6d30c232a2eb3a875d175e79d27511db253b46660586baee5c8344b6b2e6a6effdaa2b16d5bfbe0fc3d3b4f2ec443cf0a702cc9b912590907bab2634ece09a7875f43d48449fe1681394afa04cb801217503d137609e7d83ff68168c8eda6323b974ce8baae6de81f32c6f1adda7221b645e7e66b8d253f128574abc145a0a664c4374b18d9a66b208067c028bbcc0b8f9e8584ac48045af1aeac1a8ee01949968a3cb545a1b173b0d2761c59a11dfde857b379362c5e5175830b3be702d8323fcc2aa662fa1b", @typed={0x8, 0x137, 0x0, 0x0, @ipv4=@multicast1}, @typed={0x1a, 0x97, 0x0, 0x0, @binary="e0cb7566b5b87c0f97bba0abf0b416dca5a73ba8c06c"}]}, 0x114}, {&(0x7f0000000400)={0x1118, 0x30, 0x1, 0x70bd2d, 0x25dfdbff, "", [@nested={0xc, 0xbc, 0x0, 0x1, [@typed={0x8, 0x2e, 0x0, 0x0, @ipv4=@remote}]}, @generic="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", @generic="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"]}, 0x1118}, {&(0x7f0000001540)={0xbc, 0x42, 0x4, 0x70bd25, 0x25dfdbfb, "", [@generic="156a72616d73acec030020a91b3a54f7c01edb7b94801cf628358dafe452c343799c91c4c9e760f6bceb8f62681cc26abde8934aeb96391692a198db2796a1f3d4c3dac9393813a1887cda18dc6264a117370bfded3eb036b854bbda1c9c304ed441507d5d2f9c77ecb14dc7dfe3924c219de6a4e2df50d4a4cd9f9658713967b851410b7c9fafd05367bcc460b64c4fbfb48ee0ace106310a46a3b219", @nested={0xc, 0x57, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @uid=0xffffffffffffffff}]}]}, 0xbc}, {&(0x7f0000001600)={0x108, 0x3b, 0x400, 0x70bd25, 0x25dfdbfd, "", [@generic="8641e35f024100294d7b35fc5974173be4cc93c4486fbd8d1132e4c15ad45e4b7f39006303bdf85c7e6fc975161971f29240c4845040c8ccd1ac2dbaab7a23e5de5fdae3227ce32e1d50d79cbb36db15fbdac759e7535b09f2043c1af944d71fd2d8af0f1f3d27e1e1680935b14d2b4c61b8b1680d16a9573387b9e95e9e80fc01a6c785ba7b2b50460be3133692fb699cee4dee11502271f6e13a34231b2b13c36c24cc52d75626f675876db879ede29384f43c78c1c7643df764a3834131a43287b452efa4a4bb0676d86342f457abfd4036861789546e5402a632e698a24b9df3b92e85cc25d984b544d97d11becd9484f5bd91e5"]}, 0x108}], 0x4, &(0x7f0000002100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c0000000001000001000000020000008a6767d193b107863a1632eb84b36d65679f519b72fe1c448134ad7f5b2ef8ed2fcec4a79c6552648fe02ce6db7f4603bb639d47bd23ae21bf29e56d28cb0bbbfa7bb1233bca4bbb9b09e4f43a646c3914221948c8b60abbe046a1f77925b836f9f0a643b53e866c282834790fdd66a1ec2fee59000a90e88753d680309d933055bfa661fc0e28e21e04dc169dd963324127", @ANYRES32=r9, @ANYRES32=0xee00, @ANYRES32=r15, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r21, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0xd0, 0x4000000}, 0x40014) 3m48.348688781s ago: executing program 5 (id=1145): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syzkaller0\x00', 0x0}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x5453, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYBLOB="04000000000020000000000000180e10b9a542000000454e510e81", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000600)='kfree\x00', r3, 0x0, 0x2}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x2, 0x6}, 0x8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x2, 0x6, @remote}, 0x10) r5 = semget(0x2, 0x3, 0x420) semtimedop(r5, &(0x7f0000000080), 0x0, &(0x7f00000001c0)={0x77359400}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) flistxattr(r6, &(0x7f0000000640)=""/130, 0x82) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000002840), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000340)={&(0x7f0000001840)="2f4fe78a5877aad62572426dde31c54acfce3ad9341abaf6ff3f1f8fc7c051982f1dfdcc1b32abc484635a8133e47930202a4f1322b301e68b2948163133248ecfbdc6f7f6fe226a8d60b8544d5db109a51a67c7a69f1e932fbd75744251e2b86e7862bae1b05becc259e86e8d811dada3a1dfa9690de3038e14b220f61c5df002504983f35f12e1f6840e962e83accd5733044f53e8216dcb0e0ad948c9cb5b7d4923", &(0x7f0000001900)=""/145, &(0x7f00000019c0)="8c7e0757331c4c6211e598673e319b7cd9553cb06f2dae332d861de7655336bb713598730671e45c9a6fd8744434ff68bbf2242a8a11f35386bd7aa3bc1409b6c3e0c119644799628ae6ee9d19891edb43f4f27b43aa3b245f1516033275440f1bf5f2416b0cd2e70e1b594811d6e0f0ccb665f7407811064e5cc92f90d993a4990fbf37e994625b6ba3d677dede942dbca5f48f2630c13e1876c95a83b79b7d3c6d4aa98724592a8b43827464d286eac2aba4e904c303e1eb830a293a87c9", &(0x7f0000001a80)="a4f2f5c02e1c59289711d04c5118757f4c266299f23430fc23898dcee50acff40308b44e085e3161c6a8a655b1231f69cafdc38df3d8e3a137eaad83d6e9b69862630a83210226d7fcce80916ded079497f16315046281b229dd82e2d4cb480b0890572b741192f62e706764cc1782dcddfa3fa5f57ebc5106e19e8166d155e1f51bc5c84613d2d27d1fa18044874ac7383bd25f40f5a81212", 0x6, 0x1, 0x4}, 0x38) syz_emit_ethernet(0x82, &(0x7f0000001b40)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb0800450000740000000000019078ac1e0001ac1414aa03019078036100dd4500000000004000002f0009ac141410ac1414bb44440001000086dd00000000ac1414bb00000000ac14192643cabc95d1b472f6b3319f93b91d1432000000002d3089d6af4e92d1000000000000004fe000000200000000ac1414aa00000004c5242957c5ca10e212dc74b628aecc330d40ab47d70940b2935f2bdbb3"], 0x0) 3m48.308582201s ago: executing program 5 (id=1137): r0 = getpid() setreuid(0xee00, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) setns(r3, 0x24020000) syz_clone3(0x0, 0x0) 3m48.287589271s ago: executing program 33 (id=1137): r0 = getpid() setreuid(0xee00, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = syz_pidfd_open(r0, 0x0) setns(r3, 0x24020000) syz_clone3(0x0, 0x0) 1m47.393252214s ago: executing program 2 (id=3927): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) utimes(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)={{}, {0x0, 0xea60}}) 1m47.321955994s ago: executing program 2 (id=3929): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000020000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000740)=""/203, 0xcb}], 0x1}, 0x0) 1m47.227991863s ago: executing program 2 (id=3930): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x6c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x68}}, 0x0) 1m47.117146983s ago: executing program 2 (id=3932): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000340)={[{@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug}, {@minixdf}, {@resgid={'resgid', 0x3d, 0xee00}}, {@grpquota}, {@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}]}, 0x3, 0x44a, &(0x7f0000000880)="$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") chdir(&(0x7f0000000140)='./file0\x00') open(0x0, 0x14103e, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x204092, &(0x7f0000000000), 0x6, 0x50d, &(0x7f00000006c0)="$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") quotactl$Q_GETFMT(0xffffffff80000400, &(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x143042, 0x86) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x20880, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r3 = syz_io_uring_setup(0x6acf, &(0x7f0000000940), &(0x7f00000009c0), &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS2(r3, 0xf, &(0x7f0000001c80)={0x8, 0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000680)=""/128, 0x80}, {&(0x7f0000000d80)=""/81, 0x51}, {&(0x7f0000000e00)=""/184, 0xb8}, {&(0x7f0000000ec0)=""/95, 0x5f}, {&(0x7f0000000f40)=""/204, 0xcc}, {&(0x7f00000011c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/63, 0x3f}, {&(0x7f0000000400)=""/29, 0x1d}], &(0x7f0000000540)}, 0x20) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0xe) ftruncate(r1, 0x2008002) r5 = socket$tipc(0x1e, 0x5, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7, 0x0, 0x2}, 0x18) bind$tipc(r5, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r5, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000002100)='./file0\x00', 0xd0678d00f96b9804, 0xb9cfc73cfda3a87b) unshare(0x22020400) iopl(0x3) socket$inet(0xa, 0x6, 0x84) 1m46.637022051s ago: executing program 2 (id=3933): r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5}]}}}]}, 0x3c}}, 0x0) (fail_nth: 3) 1m45.745615848s ago: executing program 2 (id=3939): socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010000100001000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000000000000000000000000000000100100000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x154}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000001000035f8bebcf1090000000000000000000081712b5967742897cd0aa8efde5c8e44e877fa84bb80c9144f37cfa457d39f1ec4dcdbdb825f525ada2a82f17f8aa5b1eea792d8f7fb0c78b57a1df8d58bc6d044f0c24f2e2bc4447a55276a930a350b66cc405292f52910b418542cafcd1b1bb5e9c827511c18aeaeb5c13edef1708569a089fcc38df153dcbada960dcd3c83e78c9cb84c92e87d93f11736aa", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800800000000000000000fcffffffff17110000", @ANYRESDEC=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000280)=0xc9, 0x4) readv(r3, &(0x7f0000000200)=[{&(0x7f0000000300)=""/136, 0x88}], 0x1) sendmsg$can_bcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="05000000030800"/16, @ANYRES64=0x0, @ANYRES64=0x2710], 0x80}}, 0x0) 1m45.695930947s ago: executing program 34 (id=3939): socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010000100001000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000320000000000000000000000000000000000100100000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x154}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000001000035f8bebcf1090000000000000000000081712b5967742897cd0aa8efde5c8e44e877fa84bb80c9144f37cfa457d39f1ec4dcdbdb825f525ada2a82f17f8aa5b1eea792d8f7fb0c78b57a1df8d58bc6d044f0c24f2e2bc4447a55276a930a350b66cc405292f52910b418542cafcd1b1bb5e9c827511c18aeaeb5c13edef1708569a089fcc38df153dcbada960dcd3c83e78c9cb84c92e87d93f11736aa", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800800000000000000000fcffffffff17110000", @ANYRESDEC=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000280)=0xc9, 0x4) readv(r3, &(0x7f0000000200)=[{&(0x7f0000000300)=""/136, 0x88}], 0x1) sendmsg$can_bcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="05000000030800"/16, @ANYRES64=0x0, @ANYRES64=0x2710], 0x80}}, 0x0) 1.179802844s ago: executing program 3 (id=6341): socket(0x29, 0xa, 0x101) openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) kcmp(r0, r0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='./bus\x00', 0x200010, &(0x7f0000000200)={[{@jqfmt_vfsold}]}, 0xfe, 0x55d, &(0x7f0000000980)="$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") bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) lsm_get_self_attr(0x67, &(0x7f0000001500)={0x0, 0x0, 0x1020, 0x1000, ""/4096}, &(0x7f0000000080)=0x1020, 0x0) 1.145196104s ago: executing program 3 (id=6343): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x9c, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) connect$inet6(r0, 0x0, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 1.090446614s ago: executing program 3 (id=6345): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000002"], 0x48) 1.089505234s ago: executing program 3 (id=6346): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x20000000009, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r3}, &(0x7f0000000800), &(0x7f0000000840)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xd, 0x0, &(0x7f0000000000)="259a53f271a76d2688ca4c6588", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 768.277583ms ago: executing program 1 (id=6359): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={0x0, r0}, 0x18) 730.784183ms ago: executing program 1 (id=6361): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) syz_io_uring_setup(0x4159, &(0x7f0000000280)={0x0, 0x13a, 0x40, 0x2, 0x3d0}, &(0x7f0000000080), &(0x7f0000000300)=0x0) r4 = signalfd4(r2, &(0x7f0000000340)={[0x1]}, 0x8, 0x80800) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580), 0x400000, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000005c0)=@IORING_OP_LINKAT={0x27, 0x5, 0x0, r4, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='./file0\x00', r5, 0x1400, 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = io_uring_setup(0x60f7, &(0x7f0000000a40)={0x0, 0x1, 0x2, 0xfffffffc, 0x3bd}) r8 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440), r9) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x30, r10, 0x413, 0x0, 0x0, {{}, {}, {0x14, 0x19, {0x0, 0x1, 0x80000000}}}}, 0x30}}, 0x8840) close_range(r7, 0xffffffffffffffff, 0x0) 729.597563ms ago: executing program 1 (id=6363): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r2, r2) 683.208723ms ago: executing program 1 (id=6364): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000240)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00', 0x19, 0x8a, 0x1b}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) 682.438592ms ago: executing program 1 (id=6365): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000005b80)={{{@in6=@remote, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in, 0x0, 0x6c}, 0x0, @in6=@dev}}, 0xe8) syz_emit_ethernet(0x3e, &(0x7f00000015c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaf368656e065b0800450000300000000000019078ac1e0001e00000010400907803000000450000000000000000000000ac141400ac141400bd85c0848a4c6710d4807d8a64b5cd2328485f80d7b78aacf77fab4475298c49db949bae876e2062729413ee215015723eb1169e1bc7bb076dd687ec1fd9de2b1b2988969561019e1ab28754e11bf23c79a49cbfa1f40f8e6289b67b1d061c9d461594134ab3f743fce9a622d91f4f7935a6fbdc82e9e7ce0795e382f90ab0df57"], 0x0) socket(0x10, 0x803, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r3, 0x0, 0xca, &(0x7f00000002c0)={0x1, 0x4, 0x0, 0x0, @vifc_lcl_addr=@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f0000000200)=0x41c16f48c89e823a, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x0, 0x3}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0), 0x111}}, 0x20) r9 = socket$packet(0x11, 0x3, 0x300) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r10, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000500)={'geneve1\x00', 0x0}) sendto$packet(r10, &(0x7f0000000180)="0b032200e0ff64000200475400f6a13bb1000000080081004803", 0x10000, 0x0, &(0x7f0000000140)={0x11, 0x0, r11}, 0x14) 593.226102ms ago: executing program 1 (id=6368): r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000102c0)=ANY=[@ANYRESHEX=r0], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = io_uring_setup(0x1691, &(0x7f0000010440)={0x0, 0xb2fb, 0xcd4243b45b74ded, 0x5, 0x2db}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r6, 0x84, 0x81, &(0x7f00000003c0)="1a00000002000100", 0x8) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000010300)=ANY=[@ANYRESOCT=r5, @ANYRESDEC=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb85000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_MAKE_EQUIV(r9, &(0x7f0000010240)={&(0x7f0000000180), 0xc, &(0x7f0000010200)={&(0x7f00000001c0)={0x10, 0x3f7, 0x0, 0x0, 0x0, {0xffff, 0x453, './file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', './file0'}}, 0x10020}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r7}, 0x10) sendto$inet6(r4, &(0x7f00000002c0)="9e", 0x1a000, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r10 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200140, 0x0) r11 = socket$nl_audit(0x10, 0x3, 0x9) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000010380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000010280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r14, @ANYBLOB="010466646e6f3d", @ANYRESHEX=r15, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r16 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_RESIZE(r16, 0x5609, &(0x7f0000000500)={0x0, 0x7, 0xd56}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000080)={0xb9c, 0x0, &(0x7f0000000040)=[r1, r10, 0xffffffffffffffff, r3, 0xffffffffffffffff, r11, r1]}, 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x2e, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 544.826192ms ago: executing program 7 (id=6371): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={0x0, r0}, 0x18) 501.334482ms ago: executing program 7 (id=6373): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$getregs(0xc, r0, 0x80000000, &(0x7f00000000c0)=""/246) 501.017752ms ago: executing program 7 (id=6374): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r2, r2) 452.889102ms ago: executing program 7 (id=6376): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000240)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00', 0x19, 0x8a, 0x1b}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) 452.218841ms ago: executing program 7 (id=6377): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000a40)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000000000000000090000003c0003800800010002000000140002007663616e300000000000000000000000080003000000000014000600ff"], 0x50}}, 0x4000044) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv6_delrule={0x28, 0x21, 0x121, 0x0, 0x0, {}, [@FIB_RULE_POLICY=@FRA_UID_RANGE={0xc, 0x18, {0x0, 0xffffffffffffffff}}]}, 0x28}}, 0x0) socket$kcm(0x23, 0x2, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 404.713242ms ago: executing program 7 (id=6380): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000004000004850000006d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vlan0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@delnexthop={0x60, 0x69, 0x100, 0x70bd25, 0x25dfdbfe, {}, [{0x8}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8}, {0x8, 0x1, 0x2}, {0x8}, {0x8, 0x1, 0x2}, {0x8}, {0x8, 0x1, 0x1}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4, 0x1e3}, &(0x7f00000004c0)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) process_mrelease(0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x20}, &(0x7f0000000240)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) kexec_load(0x0, 0x0, 0x0, 0x3e0000) 256.431281ms ago: executing program 3 (id=6387): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000240)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00', 0x19, 0x8a, 0x1b}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) 232.797431ms ago: executing program 4 (id=6388): r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000000)=0x110, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000440)={&(0x7f0000000780)={0x1d, r3}, 0x10, &(0x7f0000000200)={&(0x7f0000001100)=@can={{0x0, 0x0, 0x0, 0x1}, 0x1, 0x1, 0x0, 0x0, "09151995c95f32cc"}, 0x10}}, 0x44001) recvmmsg(r2, &(0x7f0000008940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2001, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="000000800000000001000018d9e95110fe000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 232.042601ms ago: executing program 3 (id=6389): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) acct(0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='9p_protocol_dump\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$9p(r1, &(0x7f0000000180)="3a82e45a14e7fa80c50d24fcc14cf0fb0d601afa86f2970faff88a7ad4bb61832471aa23d0ecacdf4bb600fc056af840337eee8671989244724d369b06523c0c348422c69d9a49d2e78302291dd3c91bfb305db26740057b0d50a03ff199b7e9c208591a2a5e42538dbdcd", 0x6b) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000000)={0x1}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000000)={0x1}) socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r6 = getpid() sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(r6, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r9}, 0x10) socket$igmp6(0xa, 0x3, 0x2) 178.482751ms ago: executing program 4 (id=6391): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x4, 0xce, 0x2, 0x81, 0x0, @remote, @remote, 0x20, 0x0, 0x6, 0x1}}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000400)={@remote}, 0x14) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021501700001e0a05010000000000000000070000000900020073797a31000000000900010073797a300000000024170380300000802c000180250001"], 0x17d4}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 177.098021ms ago: executing program 4 (id=6393): r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x9c, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev, 0x9}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 146.711181ms ago: executing program 4 (id=6395): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd1200000000000085000000b0000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb9afcfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff90326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b74da42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0f34d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf790842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc9da71c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd7040000000094235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa12d52d21b4b36326f88546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920386f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26ab471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf974fcf36cbf6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f63af851c66ee7e30393cd574d63105c687967ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a148c364c2098fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b263d95d1d3aa737cb04a33615ff2a730e51067d5d675d0104361c37c61a43b5afd865b60d4cae89b873220f17d25979a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d4b55178bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e64701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4faa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a2689217380400a9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a20ffffffff682139c58ac1deb039a691ad640e12c12fe11d70fe495906f2d5d71778acbd4eee53a3996cb0de84bd2b059d60c0f96a53ea44e0b293865aa68df494f87db976e36ad6c06912244d4c883c4aaa60b4a1392ce0b2f2c51966504652ff871e0f6dfff9f7d34ecf04be0a58c3d53174b67d1886e34b81ad8c60da56acc64739c3acab24aa8d0ac92d465074f915608b1b60a948bad401b1a7fb3627bbe6c45123ed44bfdf8cc143bd1b7a663dc3d0476b8e39becffc429e41f66b1e37ae52aacaff0f1dc8ea70b68c25072e20586b19127d75fa71577f265c51000000000000000000000000003bba840af6f8027be80d975ac49b00f711dcc824e3b1ba21795d1dc80c87d9c042cb79706a556d58"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) migrate_pages(0x0, 0x3, &(0x7f0000000280)=0x101, &(0x7f00000002c0)=0x5) 125.26802ms ago: executing program 6 (id=6396): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fc0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = getpgrp(0x0) r3 = syz_pidfd_open(r2, 0x0) pidfd_send_signal(r3, 0x0, 0x0, 0x0) 124.6444ms ago: executing program 4 (id=6397): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}}, 0x214daff14048430f) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r1) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x11c, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x54, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2150}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_SOCK={0xb4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x355}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffff9}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xe}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x810}, 0x20044040) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x23, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r4, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_emit_ethernet(0xd2, &(0x7f00000004c0)=ANY=[@ANYBLOB="0180c2000000f5ffffffffff86dd60ecff80009c1101fe8000000000000000000000000000bbff020000000000000000000000000001"], 0x0) 108.17954ms ago: executing program 6 (id=6398): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r2, r2) 50.06216ms ago: executing program 6 (id=6399): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x12, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@call={0x85, 0x0, 0x0, 0x33}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x80000001}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0xd9, &(0x7f0000000140)=""/217, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xd, 0xfffffff8, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[{0x0, 0x2, 0x1, 0x2}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='afs_notify_call\x00', r0, 0x0, 0x5}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000440), 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r1) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000480)={r0, 0x0, 0x10000, 0x8001}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='$&\x00') r3 = dup3(0xffffffffffffffff, r0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000540), r1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0xb4, r4, 0x100, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x10}, @NL80211_ATTR_SCAN_SUPP_RATES={0x8c, 0x7d, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x34, 0x1, "aaa66c329c6b9683470236ffae4ea1202eed17602703ca7012371ae866424fa4ac5f51f7c61d710eb189432536954f70"}, @NL80211_BAND_5GHZ={0x51, 0x1, "d795a5bf0063e00e91e46ef21872471de79c97d50409ebc7d9fba2a89da2b9a0992cf842204c193ca0285f6862deac47a5810b8a325a529bff7d5e354e5d5787b99f96f132e34031b57c40064f"}]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0xb4}, 0x1, 0x0, 0x0, 0x200048d0}, 0x0) setsockopt$sock_int(r3, 0x1, 0x2c, &(0x7f0000000700)=0x40, 0x4) socket$phonet_pipe(0x23, 0x5, 0x2) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fremovexattr(r6, &(0x7f0000000740)=@known='com.apple.system.Security\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='xen_mmu_set_pmd\x00', r2, 0x0, 0x7}, 0x18) timer_create(0x2, &(0x7f0000000900)={0x0, 0x33, 0x0, @thr={&(0x7f0000000800)="8199a8ac9b841ecc140c97907f60c84b4b6bfbfe324c449a659f1be35fe0ba2e4b4ee0cd7f2443ac19a8", &(0x7f0000000840)="cf7e13b402ce8e02968b8dda7675949bcfdd73b8da305b27eb195b324d52d27d3624e5aa326466ec1067ad569a24919ffefd59926c36403a44f5016c906df6028121fb1e075196503ef5771ab8829f4e78eb59bba76088c1c240a2a7bcacf7b4e222141fa6221d6d11c92c770312986326f9681c2d2f2a3ccab5e548fafb046826b10797b2f5b459cf6f862c756ce81d057e75a70a1165274863faa3557243ff16a494"}}, &(0x7f0000000940)=0x0) timer_getoverrun(r7) openat$binfmt_format(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/fs/binfmt_misc/syz2\x00', 0x2, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000009c0)={0x2}, 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000a00)=0x4) r8 = getpid() perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0xff, 0xf, 0x7, 0x52, 0x0, 0x69, 0xa0000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0xd0, 0x101}, 0x8, 0x8, 0xc, 0x2, 0x401, 0x80000001, 0x9, 0x0, 0x2, 0x0, 0x3}, r8, 0x3, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000ac0)='.dead\x00', &(0x7f0000000b00)={'syz', 0x0}, &(0x7f0000000b40)='\\:\x00', 0xfffffffffffffffa) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000c40)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x28, 0x140a, 0x20, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x5}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x804) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000c80), 0x40001, 0x0) pread64(r9, &(0x7f0000000cc0)=""/75, 0x4b, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d40)=r1, 0x4) 49.451ms ago: executing program 4 (id=6400): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000007600110d0000000000000000030000000000000008000500c355d6ba"], 0x20}, 0x1, 0x0, 0x0, 0x4000080}, 0x20048840) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000b0000001000000003000006040000000d0000000200000006000000020000000e0000007f000000006161302e6161305f5f00623e942f752eab64b48328d088ad4b"], &(0x7f0000000680)=""/95, 0x47, 0x5f, 0x0, 0x2, 0x10000, @value}, 0x28) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000002c0)=ANY=[@ANYBLOB="800000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000005000128009000100766c616e00000000400002800600010000000000340003800c00010000000000000000000c00010094040000000000000c00010000010000000000000c00010004000000000000000800", @ANYRES32=r5, @ANYBLOB="080003"], 0x80}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x4, 0x0, 0x8000, 0x100, 0xffffffffffffffff, 0x5, '\x00', r5, r2, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r7 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r7, &(0x7f0000000040), 0x10) listen(r7, 0x0) r8 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r8, &(0x7f0000000080), 0x10) sendmmsg(r8, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{}], 0x1}}], 0x1, 0x24008094) r9 = accept4$unix(r7, 0x0, 0x0, 0x0) recvfrom$unix(r9, &(0x7f0000000140)=""/263, 0x107, 0x0, 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x34, 0x0, 0x1, 0x7ffffc, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}}, 0x0) 49.12351ms ago: executing program 6 (id=6401): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) r1 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x86) fcntl$setlease(r1, 0x400, 0x300) 48.57815ms ago: executing program 6 (id=6402): r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="080000000000e453d0c26abf75712400feb60400000000000085000000860000009500006b0bfea0", @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x18, &(0x7f0000000800)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0xd07ec05}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xf}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], &(0x7f0000000340)='syzkaller\x00', 0x40, 0x2e, &(0x7f00000005c0)=""/46, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0xb, 0x9e9, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b00)=[r2, 0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r2], 0x0, 0x10, 0x9fea, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r3}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000700)=0x75, 0x4) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r4) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000000), &(0x7f0000000200)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYRESOCT=r6], 0x40}}, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0xc816) sendmsg$nl_route(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x58}}, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010028bd7000fcdbdf25170000000e0001"], 0x54}, 0x1, 0x0, 0x0, 0x11}, 0x800) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000040)) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000e00000000000009040000000a0000000000000700f8000000004f00000000000000"], &(0x7f0000000780)=""/22, 0x34, 0x16, 0x0, 0x5, 0x10000, @value}, 0x28) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r11, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r12}, 0xa) syz_clone(0x4000400, &(0x7f00000004c0)="e5e845c6ba3e309267ed", 0xa, &(0x7f0000000500), &(0x7f0000000600), &(0x7f0000000680)="ded1a0d9ec3d2f0917a083f46d893a15fe44e40bab55b3f9ecf497d018cecd49db18563f59d28597411840e572f43a781eb1c1956dc0b285f45a0329cf6e3317280a5f") lsetxattr$security_capability(&(0x7f0000000080)='./cgroup/cgroup.procs\x00', 0x0, &(0x7f00000002c0)=@v3={0x3000000, [{0x1, 0x9}, {0x2, 0xffffffc0}]}, 0x18, 0x0) 0s ago: executing program 6 (id=6403): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000100000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e0b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x2000000000000000}, 0x18) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r2, @ANYRES32, @ANYRES32=r0, @ANYRES16=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="160ac1516f36b81817ff1fab712600"/24, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendto$inet6(r6, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000007000000050000000800000005"], 0x50) r8 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r7}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000000)='kfree\x00', r8}, 0x18) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') add_key(&(0x7f0000000600)='trusted\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)="3d2c19e68462858eb9dfbab9ec2392948298b86a1feb7406fd5d0fd17590394c5d9ec812654bbbd4d29fb990b0a755fd2c6f41605c92a411cbb550a6f0ddfe19d10b68d7", 0x44, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$nl_route(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="93630100200501001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r12, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11], 0x4c}}, 0x0) acct(&(0x7f0000000000)='./file0\x00') close_range(r6, r6, 0x0) kernel console output (not intermixed with test programs): entered blocking state [ 266.612521][ T4554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.613252][T14533] netlink: 'syz.3.4031': attribute type 13 has an invalid length. [ 266.628233][T14533] netlink: 'syz.3.4031': attribute type 27 has an invalid length. [ 266.638282][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.645413][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.664153][T14533] gretap0: refused to change device tx_queue_len [ 266.671897][T14533] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 266.763514][T14451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.904227][T14451] veth0_vlan: entered promiscuous mode [ 266.915703][T14451] veth1_vlan: entered promiscuous mode [ 266.932258][T14451] veth0_macvtap: entered promiscuous mode [ 266.940771][T14451] veth1_macvtap: entered promiscuous mode [ 266.952614][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 266.963215][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.973358][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 266.983894][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 266.993871][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 267.004348][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.014554][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 267.025052][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.036228][T14451] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 267.047941][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.058752][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.068802][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.079422][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.089472][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.100736][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.102533][T14559] bpf_get_probe_write_proto: 5 callbacks suppressed [ 267.102552][T14559] syz.3.4034[14559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.110760][T14451] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 267.118188][T14559] syz.3.4034[14559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.128921][T14451] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 267.141353][T14559] syz.3.4034[14559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.152126][T14451] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 267.180783][T14451] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.189531][T14451] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.198799][T14451] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.208021][T14451] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 267.245868][T14257] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 267.267074][T14564] netlink: 'syz.3.4037': attribute type 13 has an invalid length. [ 267.275172][T14564] netlink: 'syz.3.4037': attribute type 27 has an invalid length. [ 267.286150][T14564] gretap0: refused to change device tx_queue_len [ 267.297129][T14564] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 267.402746][T14572] loop3: detected capacity change from 0 to 8192 [ 267.404222][T14575] syz.4.4040[14575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.409247][T14575] syz.4.4040[14575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.412041][T14572] syz.3.4039: attempt to access beyond end of device [ 267.412041][T14572] loop3: rw=0, sector=57847, nr_sectors = 1 limit=8192 [ 267.421346][T14575] syz.4.4040[14575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.436136][T14572] FAT-fs (loop3): error, invalid access to FAT (entry 0x0000e1b1) [ 267.465541][T14572] FAT-fs (loop3): Filesystem has been set read-only [ 267.474961][T14580] netlink: 3 bytes leftover after parsing attributes in process `syz.3.4039'. [ 267.484155][T14580] 0ªX¹¦À: renamed from caif0 [ 267.503241][T14572] FAT-fs (loop3): error, invalid access to FAT (entry 0x0000e1b1) [ 267.511591][T14572] FAT-fs (loop3): error, invalid access to FAT (entry 0x0000e1b1) [ 267.525581][T14580] 0ªX¹¦À: entered allmulticast mode [ 267.531005][T14580] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 267.548845][T14575] IPVS: Error joining to the multicast group [ 267.556035][T14585] syz.4.4040[14585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.556107][T14585] syz.4.4040[14585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.573553][T14585] syz.4.4040[14585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.662717][T14593] syz.4.4046[14593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.676444][ T29] kauditd_printk_skb: 554 callbacks suppressed [ 267.676464][ T29] audit: type=1326 audit(1736434822.768:10128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.689129][T14593] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 267.699172][ T29] audit: type=1326 audit(1736434822.768:10129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.721981][T14596] loop6: detected capacity change from 0 to 1024 [ 267.728504][ T29] audit: type=1326 audit(1736434822.768:10130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.758120][T14596] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 267.758932][ T29] audit: type=1326 audit(1736434822.768:10131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.817272][ T29] audit: type=1326 audit(1736434822.768:10132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.820994][T14596] JBD2: no valid journal superblock found [ 267.840929][ T29] audit: type=1326 audit(1736434822.768:10133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.846624][T14596] EXT4-fs (loop6): Could not load journal inode [ 267.870302][ T29] audit: type=1326 audit(1736434822.768:10134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=163 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.900716][ T29] audit: type=1326 audit(1736434822.768:10135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.924396][ T29] audit: type=1326 audit(1736434822.768:10136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 267.948365][ T29] audit: type=1326 audit(1736434822.768:10137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14594 comm="syz.6.4047" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 268.033701][T14596] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4047'. [ 268.053108][T14601] rdma_op ffff888118214180 conn xmit_rdma 0000000000000000 [ 268.413688][T14624] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4059'. [ 268.436620][T14627] FAULT_INJECTION: forcing a failure. [ 268.436620][T14627] name failslab, interval 1, probability 0, space 0, times 0 [ 268.449351][T14627] CPU: 1 UID: 0 PID: 14627 Comm: syz.1.4061 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 268.460235][T14627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 268.470383][T14627] Call Trace: [ 268.473670][T14627] [ 268.476640][T14627] dump_stack_lvl+0xf2/0x150 [ 268.481363][T14627] dump_stack+0x15/0x1a [ 268.485599][T14627] should_fail_ex+0x223/0x230 [ 268.490373][T14627] should_failslab+0x8f/0xb0 [ 268.495061][T14627] kmem_cache_alloc_node_noprof+0x59/0x320 [ 268.501028][T14627] ? __alloc_skb+0x10b/0x310 [ 268.505703][T14627] ? avc_has_perm+0xd4/0x160 [ 268.510472][T14627] __alloc_skb+0x10b/0x310 [ 268.514911][T14627] pfkey_sendmsg+0x10d/0x970 [ 268.519622][T14627] ? avc_has_perm+0xd4/0x160 [ 268.524236][T14627] ? selinux_socket_sendmsg+0x185/0x1c0 [ 268.529898][T14627] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 268.535049][T14627] __sock_sendmsg+0x140/0x180 [ 268.540822][T14627] ____sys_sendmsg+0x312/0x410 [ 268.545620][T14627] __sys_sendmsg+0x19d/0x230 [ 268.550299][T14627] __x64_sys_sendmsg+0x46/0x50 [ 268.555138][T14627] x64_sys_call+0x2734/0x2dc0 [ 268.559889][T14627] do_syscall_64+0xc9/0x1c0 [ 268.564456][T14627] ? clear_bhb_loop+0x55/0xb0 [ 268.569187][T14627] ? clear_bhb_loop+0x55/0xb0 [ 268.573941][T14627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.579919][T14627] RIP: 0033:0x7f22be1d5d29 [ 268.584402][T14627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.604255][T14627] RSP: 002b:00007f22bc847038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.613033][T14627] RAX: ffffffffffffffda RBX: 00007f22be3c5fa0 RCX: 00007f22be1d5d29 [ 268.621029][T14627] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000006 [ 268.629038][T14627] RBP: 00007f22bc847090 R08: 0000000000000000 R09: 0000000000000000 [ 268.637811][T14627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.646204][T14627] R13: 0000000000000000 R14: 00007f22be3c5fa0 R15: 00007ffe50ca7c18 [ 268.654488][T14627] [ 268.955042][T14672] hsr_slave_0: left promiscuous mode [ 268.963603][T14672] hsr_slave_1: left promiscuous mode [ 269.019705][T14677] SELinux: Context system_u:object_r:hwclock_exec_t:s0 is not valid (left unmapped). [ 269.033299][T14677] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4080'. [ 269.043841][T14681] netlink: 'syz.4.4084': attribute type 13 has an invalid length. [ 269.051768][T14681] netlink: 'syz.4.4084': attribute type 27 has an invalid length. [ 269.097703][T14681] gretap0: refused to change device tx_queue_len [ 269.105967][T14681] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 269.153895][T14688] IPVS: Error joining to the multicast group [ 269.433249][T14718] netlink: 'syz.4.4100': attribute type 13 has an invalid length. [ 269.441224][T14718] netlink: 'syz.4.4100': attribute type 27 has an invalid length. [ 269.451980][T14718] gretap0: refused to change device tx_queue_len [ 269.459267][T14718] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 269.509007][T14720] netlink: 'syz.4.4101': attribute type 4 has an invalid length. [ 269.665603][T14738] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 269.672916][T14738] IPv6: NLM_F_CREATE should be set when creating new route [ 269.733554][T14744] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4110'. [ 270.049584][T14757] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4118'. [ 270.182899][T14765] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4122'. [ 270.199383][T14767] loop3: detected capacity change from 0 to 128 [ 270.345258][T14785] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 270.363496][T14787] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4132'. [ 270.625102][T14799] Cannot find add_set index 0 as target [ 271.084355][T14819] bridge0: entered promiscuous mode [ 271.090839][T14819] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4144'. [ 271.099812][T14819] bridge_slave_1: left allmulticast mode [ 271.105538][T14819] bridge_slave_1: left promiscuous mode [ 271.111324][T14819] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.119509][T14819] bridge_slave_0: left allmulticast mode [ 271.125244][T14819] bridge_slave_0: left promiscuous mode [ 271.131030][T14819] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.168493][T14819] bridge0 (unregistering): left promiscuous mode [ 271.253279][T14840] netlink: 'syz.7.4152': attribute type 13 has an invalid length. [ 271.261316][T14840] netlink: 'syz.7.4152': attribute type 27 has an invalid length. [ 271.277211][T14840] gretap0: refused to change device tx_queue_len [ 271.285238][T14840] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 271.621377][T14883] netlink: 'syz.7.4171': attribute type 13 has an invalid length. [ 271.629258][T14883] netlink: 'syz.7.4171': attribute type 27 has an invalid length. [ 271.638915][T14883] gretap0: refused to change device tx_queue_len [ 271.646219][T14883] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 272.148442][T14923] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4187'. [ 272.222564][T14932] bpf_get_probe_write_proto: 11 callbacks suppressed [ 272.222583][T14932] syz.7.4190[14932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.229758][T14932] syz.7.4190[14932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.230319][T14934] netlink: 'syz.6.4191': attribute type 13 has an invalid length. [ 272.241721][T14932] syz.7.4190[14932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.263518][T14932] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 272.285658][T14934] gretap0: refused to change device tx_queue_len [ 272.294275][T14934] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 272.343689][T14941] hsr_slave_0: left promiscuous mode [ 272.352281][T14941] hsr_slave_1: left promiscuous mode [ 272.384382][T14943] hsr_slave_0: left promiscuous mode [ 272.396537][T14943] hsr_slave_1: left promiscuous mode [ 272.555909][T14966] gretap0: refused to change device tx_queue_len [ 272.567457][T14966] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 272.626652][T14975] syz.7.4210[14975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.626739][T14975] syz.7.4210[14975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.638944][T14975] syz.7.4210[14975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.656925][T14975] IPVS: Error joining to the multicast group [ 272.668239][T14982] loop3: detected capacity change from 0 to 1024 [ 272.669352][T14975] syz.7.4210[14975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.685234][T14975] syz.7.4210[14975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.693062][T14982] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 272.697064][ T29] kauditd_printk_skb: 428 callbacks suppressed [ 272.697082][ T29] audit: type=1326 audit(1736434827.778:10566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f04332f498a code=0x7ffc0000 [ 272.747935][ T29] audit: type=1326 audit(1736434827.778:10567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f04332f498a code=0x7ffc0000 [ 272.750014][T14982] JBD2: no valid journal superblock found [ 272.771481][ T29] audit: type=1326 audit(1736434827.778:10568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f04332f4597 code=0x7ffc0000 [ 272.771539][ T29] audit: type=1326 audit(1736434827.778:10569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f04332f74ca code=0x7ffc0000 [ 272.825111][T14982] EXT4-fs (loop3): Could not load journal inode [ 272.855159][ T29] audit: type=1326 audit(1736434827.948:10570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f04332f4690 code=0x7ffc0000 [ 272.878893][ T29] audit: type=1326 audit(1736434827.948:10571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f04332f592b code=0x7ffc0000 [ 272.902480][ T29] audit: type=1326 audit(1736434827.948:10572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f04332f498a code=0x7ffc0000 [ 272.927355][ T29] audit: type=1326 audit(1736434827.948:10573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 272.951251][ T29] audit: type=1326 audit(1736434827.948:10574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 272.974881][ T29] audit: type=1326 audit(1736434827.948:10575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14981 comm="syz.3.4209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 273.116922][T15009] gretap0: refused to change device tx_queue_len [ 273.124139][T15009] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 273.301238][T15028] bridge0: entered promiscuous mode [ 273.306875][T15028] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4227'. [ 273.317422][T15028] bridge_slave_1: left allmulticast mode [ 273.323106][T15028] bridge_slave_1: left promiscuous mode [ 273.328867][T15028] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.339484][T15028] bridge_slave_0: left allmulticast mode [ 273.345254][T15028] bridge_slave_0: left promiscuous mode [ 273.351054][T15028] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.384006][T15028] bridge0 (unregistering): left promiscuous mode [ 273.410644][T15035] Invalid option length (164) for dns_resolver key [ 273.521748][T15046] syz.7.4235[15046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.521895][T15046] syz.7.4235[15046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.587364][T15056] IPVS: Error joining to the multicast group [ 273.804639][T15075] IPVS: Error joining to the multicast group [ 273.810781][T15077] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 274.012483][T15098] loop3: detected capacity change from 0 to 164 [ 274.020162][T15098] iso9660: Unknown parameter '' [ 274.021716][T15101] 9p: Unknown Cache mode or invalid value f [ 274.054682][T15103] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4260'. [ 274.100144][T15107] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4262'. [ 274.138112][T15089] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4255'. [ 274.779140][T15144] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4277'. [ 274.788419][T15144] bridge_slave_1: left allmulticast mode [ 274.794176][T15144] bridge_slave_1: left promiscuous mode [ 274.799917][T15144] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.809568][T15144] bridge_slave_0: left allmulticast mode [ 274.815377][T15144] bridge_slave_0: left promiscuous mode [ 274.821283][T15144] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.891611][T15146] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4279'. [ 275.026479][T15163] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4284'. [ 275.111589][T15176] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4291'. [ 275.371507][T15211] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4306'. [ 275.372473][T15215] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4308'. [ 275.411956][T15216] loop3: detected capacity change from 0 to 256 [ 275.548104][T15240] netlink: 133492 bytes leftover after parsing attributes in process `syz.1.4319'. [ 275.790312][T15271] loop3: detected capacity change from 0 to 2048 [ 275.818303][T15273] IPVS: Error joining to the multicast group [ 275.832517][T15271] GPT:first_usable_lbas don't match. [ 275.837863][T15271] GPT:34 != 290 [ 275.841598][T15271] GPT: Use GNU Parted to correct GPT errors. [ 275.847768][T15271] loop3: p1 p2 p3 [ 276.093137][T15305] loop3: detected capacity change from 0 to 512 [ 276.104501][T15305] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #2: comm syz.3.4350: corrupted xattr block 255: invalid header [ 276.119559][T15305] EXT4-fs (loop3): Cannot turn on journaled quota: type 1: error -117 [ 276.143447][T15305] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 276.166032][T15305] EXT4-fs error (device loop3): ext4_xattr_block_get:596: inode #2: comm syz.3.4350: corrupted xattr block 255: invalid header [ 276.181128][T15305] SELinux: (dev loop3, type ext4) getxattr errno 117 [ 276.195271][T15305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 276.205546][T15316] IPVS: Error joining to the multicast group [ 276.457167][T15350] hsr_slave_0: left promiscuous mode [ 276.463524][T15350] hsr_slave_1: left promiscuous mode [ 276.655547][T15369] loop3: detected capacity change from 0 to 164 [ 276.748112][T15379] xt_hashlimit: max too large, truncated to 1048576 [ 276.755834][T15379] Cannot find set identified by id 0 to match [ 276.939933][T15399] FAULT_INJECTION: forcing a failure. [ 276.939933][T15399] name failslab, interval 1, probability 0, space 0, times 0 [ 276.952716][T15399] CPU: 0 UID: 0 PID: 15399 Comm: syz.3.4388 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 276.963563][T15399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 276.973707][T15399] Call Trace: [ 276.977025][T15399] [ 276.979958][T15399] dump_stack_lvl+0xf2/0x150 [ 276.984749][T15399] dump_stack+0x15/0x1a [ 276.988917][T15399] should_fail_ex+0x223/0x230 [ 276.993603][T15399] should_failslab+0x8f/0xb0 [ 276.998270][T15399] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 277.004619][T15399] ? sidtab_sid2str_get+0xb8/0x140 [ 277.009758][T15399] kmemdup_noprof+0x2a/0x60 [ 277.014370][T15399] sidtab_sid2str_get+0xb8/0x140 [ 277.019383][T15399] security_sid_to_context_core+0x1eb/0x2f0 [ 277.025298][T15399] security_sid_to_context+0x27/0x30 [ 277.030772][T15399] selinux_lsmprop_to_secctx+0x2c/0x40 [ 277.036325][T15399] security_lsmprop_to_secctx+0x4a/0x90 [ 277.041904][T15399] audit_log_task_context+0x93/0x1c0 [ 277.047247][T15399] audit_log_task+0xf9/0x1c0 [ 277.051849][T15399] audit_seccomp+0x68/0x130 [ 277.056437][T15399] __seccomp_filter+0x6fa/0x1180 [ 277.061397][T15399] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 277.067144][T15399] ? vfs_write+0x596/0x920 [ 277.071572][T15399] ? __schedule+0x6fa/0x930 [ 277.076101][T15399] __secure_computing+0x9f/0x1c0 [ 277.081080][T15399] syscall_trace_enter+0xd1/0x1f0 [ 277.086190][T15399] do_syscall_64+0xaa/0x1c0 [ 277.090715][T15399] ? clear_bhb_loop+0x55/0xb0 [ 277.095429][T15399] ? clear_bhb_loop+0x55/0xb0 [ 277.100138][T15399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.106304][T15399] RIP: 0033:0x7f04332f5d29 [ 277.110756][T15399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.130425][T15399] RSP: 002b:00007f0431967038 EFLAGS: 00000246 ORIG_RAX: 0000000000000125 [ 277.138909][T15399] RAX: ffffffffffffffda RBX: 00007f04334e5fa0 RCX: 00007f04332f5d29 [ 277.147000][T15399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001900 [ 277.154992][T15399] RBP: 00007f0431967090 R08: 0000000000000000 R09: 0000000000000000 [ 277.163007][T15399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.171082][T15399] R13: 0000000000000000 R14: 00007f04334e5fa0 R15: 00007fffd40b6068 [ 277.179088][T15399] [ 277.223322][T15406] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 277.404050][T15420] bridge0: entered promiscuous mode [ 277.410031][T15419] bridge0: left promiscuous mode [ 278.415382][ T29] kauditd_printk_skb: 517 callbacks suppressed [ 278.415401][ T29] audit: type=1326 audit(1736434833.508:11092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.452030][ T29] audit: type=1326 audit(1736434833.508:11093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.475797][ T29] audit: type=1326 audit(1736434833.508:11094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.499498][ T29] audit: type=1326 audit(1736434833.508:11095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.523177][ T29] audit: type=1326 audit(1736434833.508:11096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.546893][ T29] audit: type=1326 audit(1736434833.508:11097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.570741][ T29] audit: type=1326 audit(1736434833.508:11098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.594361][ T29] audit: type=1326 audit(1736434833.508:11099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.618502][ T29] audit: type=1326 audit(1736434833.538:11100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.642406][ T29] audit: type=1326 audit(1736434833.538:11101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15482 comm="syz.6.4421" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 278.746840][T15496] tipc: Started in network mode [ 278.751799][T15496] tipc: Node identity , cluster identity 4711 [ 278.757898][T15496] tipc: Failed to set node id, please configure manually [ 278.764959][T15496] tipc: Enabling of bearer rejected, failed to enable media [ 278.780577][T15496] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=15496 comm=syz.4.4427 [ 278.868490][T15512] validate_nla: 6 callbacks suppressed [ 278.868507][T15512] netlink: 'syz.4.4435': attribute type 3 has an invalid length. [ 279.132989][T15538] xt_hashlimit: max too large, truncated to 1048576 [ 279.169713][T15538] bond1: entered promiscuous mode [ 279.174898][T15538] bond1: entered allmulticast mode [ 279.180287][T15538] 8021q: adding VLAN 0 to HW filter on device bond1 [ 279.193211][T15538] bond1 (unregistering): Released all slaves [ 279.279500][T15554] __nla_validate_parse: 5 callbacks suppressed [ 279.279558][T15554] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4452'. [ 279.450238][T15549] bpf_get_probe_write_proto: 31 callbacks suppressed [ 279.450256][T15549] syz.4.4450[15549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.457160][T15549] syz.4.4450[15549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.476514][T15549] syz.4.4450[15549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.513328][T15549] vlan3: entered allmulticast mode [ 279.530050][T15549] bridge_slave_0: entered allmulticast mode [ 279.540249][T15549] bridge_slave_0: left allmulticast mode [ 279.587939][T15563] netlink: 'syz.7.4455': attribute type 10 has an invalid length. [ 279.625630][T15563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.636933][T15563] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 279.679703][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.681218][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.693466][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.719184][T15584] IPVS: Error joining to the multicast group [ 279.738655][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.738761][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.759502][T15584] syz.3.4465[15584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.808149][T15587] syz.7.4466[15587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.048143][T15618] netlink: 16 bytes leftover after parsing attributes in process `syz.7.4478'. [ 280.191041][T15623] IPVS: Error joining to the multicast group [ 280.280139][T15633] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4484'. [ 280.365351][T15647] netlink: 132 bytes leftover after parsing attributes in process `syz.1.4491'. [ 280.544153][T15664] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4499'. [ 280.656156][T15686] IPVS: Error joining to the multicast group [ 280.790976][T15710] netlink: 132 bytes leftover after parsing attributes in process `syz.6.4518'. [ 280.910418][T15718] IPVS: Error joining to the multicast group [ 281.958505][T15800] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4552'. [ 282.116865][T15822] loop3: detected capacity change from 0 to 164 [ 282.322832][T15853] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4573'. [ 282.351277][T15856] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4574'. [ 282.360433][T15856] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4574'. [ 282.850671][T15902] IPVS: Error joining to the multicast group [ 283.581853][ T29] kauditd_printk_skb: 413 callbacks suppressed [ 283.581872][ T29] audit: type=1326 audit(283.129:11515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.612204][ T29] audit: type=1326 audit(283.129:11516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.635345][ T29] audit: type=1326 audit(283.129:11517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.658459][ T29] audit: type=1326 audit(283.129:11518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.681701][ T29] audit: type=1326 audit(283.129:11519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.704728][ T29] audit: type=1326 audit(283.129:11520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.727959][ T29] audit: type=1326 audit(283.129:11521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.751292][ T29] audit: type=1326 audit(283.129:11522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.774521][ T29] audit: type=1326 audit(283.129:11523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.797553][ T29] audit: type=1326 audit(283.129:11524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15979 comm="syz.4.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 283.989310][T16007] uprobe: syz.7.4633:16007 failed to unregister, leaking uprobe [ 284.143374][T16019] netlink: 'syz.6.4638': attribute type 3 has an invalid length. [ 284.642737][T16053] loop3: detected capacity change from 0 to 512 [ 284.772376][T16053] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 284.786195][T16065] bpf_get_probe_write_proto: 29 callbacks suppressed [ 284.786214][T16065] syz.7.4656[16065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.808062][T16065] syz.7.4656[16065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.819785][T16065] syz.7.4656[16065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.858226][T16070] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 284.897825][T16053] EXT4-fs error (device loop3): ext4_acquire_dquot:6938: comm syz.3.4651: Failed to acquire dquot type 0 [ 284.948294][T12589] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 285.079323][T16082] __nla_validate_parse: 8 callbacks suppressed [ 285.079345][T16082] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4664'. [ 285.276847][T16095] syz.6.4668[16095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.277030][T16095] syz.6.4668[16095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.293464][T16095] syz.6.4668[16095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.645495][T16124] syz.7.4682[16124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.663664][T16124] syz.7.4682[16124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.675835][T16124] syz.7.4682[16124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.698156][T16124] IPVS: Error joining to the multicast group [ 285.718138][T16127] syz.3.4681[16127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.722072][T16133] vlan3: entered allmulticast mode [ 285.738692][T16133] bridge_slave_0: entered allmulticast mode [ 285.750188][T16133] bridge_slave_0: left allmulticast mode [ 285.802639][T16141] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4690'. [ 286.165775][T16169] vlan3: entered allmulticast mode [ 286.171054][T16169] bridge_slave_0: entered allmulticast mode [ 286.179271][T16169] bridge_slave_0: left allmulticast mode [ 286.570218][T16175] xt_CT: You must specify a L4 protocol and not use inversions on it [ 286.577105][T16176] xt_CT: You must specify a L4 protocol and not use inversions on it [ 286.626092][T16181] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4705'. [ 287.117882][T16212] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4718'. [ 287.771870][T16236] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4729'. [ 287.835130][T16244] bridge0: entered promiscuous mode [ 287.844679][T16244] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4733'. [ 287.854210][T16244] bridge_slave_1: left allmulticast mode [ 287.859937][T16244] bridge_slave_1: left promiscuous mode [ 287.865638][T16244] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.876262][T16244] bridge_slave_0: left allmulticast mode [ 287.882188][T16244] bridge_slave_0: left promiscuous mode [ 287.888140][T16244] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.902521][T16244] bridge0 (unregistering): left promiscuous mode [ 287.981537][T16252] IPVS: Error joining to the multicast group [ 288.052444][T16260] loop3: detected capacity change from 0 to 164 [ 288.060824][T16260] Unable to read rock-ridge attributes [ 288.067782][T16262] netlink: 40 bytes leftover after parsing attributes in process `syz.1.4741'. [ 288.077009][T16260] Unable to read rock-ridge attributes [ 288.209932][ T3382] IPVS: starting estimator thread 0... [ 288.211507][T16269] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 288.233239][T16275] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4746'. [ 288.301948][T16280] IPVS: using max 2448 ests per chain, 122400 per kthread [ 288.327222][T16292] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4753'. [ 288.406433][T16307] bridge0: entered promiscuous mode [ 288.412291][T16307] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4760'. [ 288.421329][T16307] bridge_slave_1: left allmulticast mode [ 288.427042][T16307] bridge_slave_1: left promiscuous mode [ 288.432807][T16307] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.440587][T16307] bridge_slave_0: left allmulticast mode [ 288.446341][T16307] bridge_slave_0: left promiscuous mode [ 288.452070][T16307] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.473635][T16307] bridge0 (unregistering): left promiscuous mode [ 288.524834][T16312] x_tables: duplicate underflow at hook 1 [ 288.614210][T16320] loop3: detected capacity change from 0 to 512 [ 288.632740][T16320] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.4766: corrupted in-inode xattr: invalid ea_ino [ 288.646485][T16320] EXT4-fs error (device loop3): ext4_orphan_get:1394: comm syz.3.4766: couldn't read orphan inode 15 (err -117) [ 288.659133][T16320] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 288.688557][T16320] SELinux: Context @ is not valid (left unmapped). [ 288.695813][ T29] kauditd_printk_skb: 238 callbacks suppressed [ 288.695828][ T29] audit: type=1400 audit(288.249:11761): avc: denied { relabelto } for pid=16319 comm="syz.3.4766" name="rdma.current" dev="loop3" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="@" [ 288.737387][T12589] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 288.804674][ T29] audit: type=1326 audit(288.349:11762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.827775][ T29] audit: type=1326 audit(288.349:11763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.851281][ T29] audit: type=1326 audit(288.349:11764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.874423][ T29] audit: type=1326 audit(288.349:11765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.897719][ T29] audit: type=1326 audit(288.349:11766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.921471][ T29] audit: type=1326 audit(288.349:11767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=216 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.944584][ T29] audit: type=1326 audit(288.349:11768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16341 comm="syz.4.4775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 288.968947][ T29] audit: type=1326 audit(288.449:11769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16348 comm="syz.3.4778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 288.992070][ T29] audit: type=1326 audit(288.449:11770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16348 comm="syz.3.4778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 289.369516][T16390] IPVS: Error joining to the multicast group [ 289.513369][T16405] loop3: detected capacity change from 0 to 164 [ 289.573273][T16409] Unsupported NM flag settings (8) [ 289.637506][T16416] netem: unknown loss type 0 [ 289.642250][T16416] netem: change failed [ 289.646471][T16415] netem: unknown loss type 0 [ 289.651449][T16415] netem: change failed [ 289.684080][T16418] IPVS: Error joining to the multicast group [ 289.932877][T16445] bpf_get_probe_write_proto: 35 callbacks suppressed [ 289.932897][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.006016][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.024304][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.097951][T16452] IPVS: Error joining to the multicast group [ 290.125731][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.125827][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.140908][T16445] syz.6.4818[16445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.237790][T16476] __nla_validate_parse: 8 callbacks suppressed [ 290.237811][T16476] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4832'. [ 290.505353][T16500] loop3: detected capacity change from 0 to 128 [ 290.516717][T16500] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 290.535193][T16500] netlink: 'syz.3.4844': attribute type 10 has an invalid length. [ 290.577348][T12589] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 290.618506][T16509] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.622603][T16514] loop3: detected capacity change from 0 to 512 [ 290.636854][T16514] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 290.648480][T16514] EXT4-fs (loop3): 1 truncate cleaned up [ 290.656293][T16514] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 290.682605][T16509] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.693959][T16514] netlink: 76 bytes leftover after parsing attributes in process `+}[@'. [ 290.726699][T12589] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 290.759748][T16509] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.818044][T16523] netlink: 3 bytes leftover after parsing attributes in process `syz.3.4852'. [ 290.828431][T16523] 1ªX¹¦À: renamed from 60ªX¹¦À [ 290.835680][T16523] A link change request failed with some changes committed already. Interface 61ªX¹¦À may have been left with an inconsistent configuration, please check. [ 290.855085][T16523] loop3: detected capacity change from 0 to 164 [ 290.862320][T16523] Unable to read rock-ridge attributes [ 290.891207][T16509] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 290.937718][T16509] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.949666][T16509] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.961670][T16509] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.974124][T16509] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.015251][T16533] netlink: 96 bytes leftover after parsing attributes in process `syz.7.4857'. [ 291.039892][T16536] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4858'. [ 291.189265][T16553] vlan0: entered promiscuous mode [ 291.194457][T16553] vlan0: entered allmulticast mode [ 291.307819][T16567] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4871'. [ 291.474930][T16594] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4883'. [ 291.651351][T16609] loop3: detected capacity change from 0 to 512 [ 291.664462][T16609] ext4: Unknown parameter 'fsname' [ 291.674311][T16597] syz.1.4884[16597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.674378][T16597] syz.1.4884[16597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.689052][T16597] syz.1.4884[16597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.706937][T16597] vlan2: entered allmulticast mode [ 291.723777][T16597] bridge_slave_0: entered allmulticast mode [ 291.733159][T16597] bridge_slave_0: left allmulticast mode [ 291.815779][T16625] 9pnet_fd: Insufficient options for proto=fd [ 291.848812][T16629] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4894'. [ 291.882546][T16634] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4896'. [ 291.981856][T16649] batadv_slave_1: entered promiscuous mode [ 292.042793][T16647] batadv_slave_1: left promiscuous mode [ 292.237687][T16667] syz.4.4910[16667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.284127][T16674] loop3: detected capacity change from 0 to 2048 [ 292.328672][T16674] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 292.354940][T16674] EXT4-fs (loop3): Delayed block allocation failed for inode 15 at logical offset 1 with max blocks 1 with error 28 [ 292.367273][T16674] EXT4-fs (loop3): This should not happen!! Data will be lost [ 292.367273][T16674] [ 292.376965][T16674] EXT4-fs (loop3): Total free blocks count 0 [ 292.382998][T16674] EXT4-fs (loop3): Free/Dirty block details [ 292.388907][T16674] EXT4-fs (loop3): free_blocks=0 [ 292.393907][T16674] EXT4-fs (loop3): dirty_blocks=0 [ 292.398940][T16674] EXT4-fs (loop3): Block reservation details [ 292.404963][T16674] EXT4-fs (loop3): i_reserved_data_blocks=0 [ 292.470622][T12589] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 292.611187][T16700] IPVS: Error joining to the multicast group [ 292.721350][T16704] xt_CT: No such helper "snmp_trap" [ 293.432858][T16740] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4937'. [ 293.445806][T16740] xfrm1: entered promiscuous mode [ 293.450973][T16740] xfrm1: entered allmulticast mode [ 293.803694][T16794] rdma_op ffff88810bdedd80 conn xmit_rdma 0000000000000000 [ 293.901921][ T29] kauditd_printk_skb: 439 callbacks suppressed [ 293.901942][ T29] audit: type=1400 audit(293.439:12210): avc: denied { nlmsg_write } for pid=16797 comm="syz.4.4961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 294.005952][T16804] loop3: detected capacity change from 0 to 164 [ 294.116149][ T29] audit: type=1326 audit(293.659:12211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16809 comm="syz.3.4965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 294.139753][ T29] audit: type=1326 audit(293.689:12212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16809 comm="syz.3.4965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 294.162944][ T29] audit: type=1326 audit(293.689:12213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16809 comm="syz.3.4965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=235 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 294.186164][ T29] audit: type=1326 audit(293.689:12214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16809 comm="syz.3.4965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 294.210163][ T29] audit: type=1326 audit(293.689:12215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16809 comm="syz.3.4965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 294.287561][ T29] audit: type=1326 audit(293.829:12216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16823 comm="syz.4.4971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 294.310755][ T29] audit: type=1326 audit(293.829:12217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16823 comm="syz.4.4971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 294.334089][ T29] audit: type=1326 audit(293.829:12218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16823 comm="syz.4.4971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 294.357316][ T29] audit: type=1326 audit(293.829:12219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16823 comm="syz.4.4971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 294.704184][T16876] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 294.716140][T16876] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 294.911750][T16872] vlan2: entered allmulticast mode [ 294.916929][T16872] bridge_slave_0: entered allmulticast mode [ 294.940751][T16872] bridge_slave_0: left allmulticast mode [ 294.973042][T16874] bpf_get_probe_write_proto: 17 callbacks suppressed [ 294.973065][T16874] syz.4.4990[16874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.980158][T16874] syz.4.4990[16874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.993543][T16874] syz.4.4990[16874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.011228][T16874] vlan3: entered allmulticast mode [ 295.028411][T16874] bridge_slave_0: entered allmulticast mode [ 295.038175][T16874] bridge_slave_0: left allmulticast mode [ 295.247831][T16901] syz.3.5001[16901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.247947][T16901] syz.3.5001[16901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.269157][T16901] syz.3.5001[16901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.353669][T16919] __nla_validate_parse: 8 callbacks suppressed [ 295.353768][T16919] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5008'. [ 295.459210][T16929] netlink: 'syz.1.5012': attribute type 33 has an invalid length. [ 295.467150][T16929] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5012'. [ 295.481738][T16928] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5011'. [ 295.592530][T16941] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5016'. [ 295.645268][T16944] netlink: 76 bytes leftover after parsing attributes in process `+}[@'. [ 295.773559][T16955] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5021'. [ 295.876256][T16948] syz.1.5019[16948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.876402][T16948] syz.1.5019[16948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.892760][T16948] syz.1.5019[16948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.981923][T16968] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5025'. [ 296.168496][T16988] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5032'. [ 296.228128][T16992] netlink: 'syz.1.5034': attribute type 33 has an invalid length. [ 296.236092][T16992] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5034'. [ 296.308141][T16986] syz.7.5031[16986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.311905][T16986] vlan3: entered allmulticast mode [ 296.328572][T16986] bridge_slave_0: entered allmulticast mode [ 296.350157][T16986] bridge_slave_0: left allmulticast mode [ 296.392236][T17001] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5037'. [ 296.510702][ T24] IPVS: starting estimator thread 0... [ 296.599999][T17018] IPVS: using max 2448 ests per chain, 122400 per kthread [ 296.702162][T17041] sctp: [Deprecated]: syz.6.5049 (pid 17041) Use of int in max_burst socket option deprecated. [ 296.702162][T17041] Use struct sctp_assoc_value instead [ 296.727876][T17026] vlan3: entered allmulticast mode [ 296.733079][T17026] bridge_slave_0: entered allmulticast mode [ 296.741652][T17026] bridge_slave_0: left allmulticast mode [ 296.798422][T17042] SELinux: Context system_u:object_r:gpg_agent_exec_t:s0 is not valid (left unmapped). [ 296.932280][T17064] 9pnet_fd: Insufficient options for proto=fd [ 296.949714][T17064] SELinux: Context system_u:object_r:scanner_device_t:s0 is not valid (left unmapped). [ 296.978582][T17067] netlink: 'syz.4.5062': attribute type 33 has an invalid length. [ 297.290166][T17072] IPVS: Error joining to the multicast group [ 297.689246][T17099] bond0: (slave bond_slave_0): Releasing backup interface [ 297.703434][T17099] bond0: (slave bond_slave_1): Releasing backup interface [ 297.721596][T17099] team0: Port device team_slave_0 removed [ 297.734192][T17099] team0: Port device team_slave_1 removed [ 297.742060][T17099] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 297.749548][T17099] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 297.758732][T17099] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 297.766379][T17099] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 297.779044][T17099] team0: Port device hsr_slave_0 removed [ 297.853428][T17111] netlink: 'syz.7.5082': attribute type 33 has an invalid length. [ 298.101136][T17138] netlink: 'syz.7.5094': attribute type 33 has an invalid length. [ 298.177866][T17119] vlan3: entered allmulticast mode [ 298.183136][T17119] bridge_slave_0: entered allmulticast mode [ 298.201642][T17119] bridge_slave_0: left allmulticast mode [ 298.465080][T17162] IPVS: Error joining to the multicast group [ 298.731955][T17184] IPVS: Error joining to the multicast group [ 298.999800][ T29] kauditd_printk_skb: 470 callbacks suppressed [ 298.999816][ T29] audit: type=1326 audit(298.539:12690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.038577][ T29] audit: type=1326 audit(298.569:12691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.061714][ T29] audit: type=1326 audit(298.579:12692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.084831][ T29] audit: type=1326 audit(298.579:12693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.109210][ T29] audit: type=1326 audit(298.579:12694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.132587][ T29] audit: type=1326 audit(298.579:12695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.155623][ T29] audit: type=1326 audit(298.579:12696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.178817][ T29] audit: type=1326 audit(298.579:12697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.201866][ T29] audit: type=1326 audit(298.579:12698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.225104][ T29] audit: type=1326 audit(298.579:12699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17219 comm="syz.4.5127" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 299.256881][T17237] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 299.273430][T17233] IPVS: Error joining to the multicast group [ 300.049831][T17332] netlink: 'syz.1.5178': attribute type 33 has an invalid length. [ 300.088967][T17338] bpf_get_probe_write_proto: 32 callbacks suppressed [ 300.088991][T17338] syz.1.5181[17338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.095999][T17338] syz.1.5181[17338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.111388][T17338] syz.1.5181[17338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.147396][T17344] bond0: (slave bond_slave_0): Releasing backup interface [ 300.170827][T17344] bond0: (slave bond_slave_1): Releasing backup interface [ 300.187736][T17344] team0: Port device team_slave_0 removed [ 300.199359][T17347] syz.1.5181[17347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.199458][T17347] syz.1.5181[17347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.205348][T17344] team0: Port device team_slave_1 removed [ 300.221331][T17347] syz.1.5181[17347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.224278][T17344] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 300.247294][T17344] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 300.256213][T17344] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 300.263694][T17344] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 300.282880][T17338] IPVS: Error joining to the multicast group [ 300.438408][T17368] syz.1.5195[17368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.438638][T17368] syz.1.5195[17368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.450563][T17370] IPv6: NLM_F_CREATE should be specified when creating new route [ 300.459953][T17368] syz.1.5195[17368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.489158][T17372] __nla_validate_parse: 16 callbacks suppressed [ 300.489187][T17372] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5197'. [ 300.535752][T17368] IPVS: Error joining to the multicast group [ 300.542911][T17368] syz.1.5195[17368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.569808][T17377] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5199'. [ 300.703924][T17400] bond0: (slave batadv0): Releasing backup interface [ 300.741571][T17400] bond0: (slave bond_slave_0): Releasing backup interface [ 300.754024][T17400] bond0: (slave bond_slave_1): Releasing backup interface [ 300.767896][T17400] team0: Port device team_slave_0 removed [ 300.777133][T17400] team0: Port device team_slave_1 removed [ 300.792593][T17400] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 300.800154][T17400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 300.809161][T17400] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 300.816702][T17400] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 300.965268][T17417] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5216'. [ 301.088911][T17438] new mount options do not match the existing superblock, will be ignored [ 301.354397][T17460] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5232'. [ 301.562113][T17491] xt_hashlimit: max too large, truncated to 1048576 [ 301.837393][T17528] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5258'. [ 301.846502][T17528] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5258'. [ 301.860343][T17528] gretap1: entered allmulticast mode [ 301.901574][T17534] bond0: (slave bond_slave_0): Releasing backup interface [ 301.916114][T17536] netlink: 'syz.4.5262': attribute type 1 has an invalid length. [ 301.924440][T17534] bond0: (slave bond_slave_1): Releasing backup interface [ 302.071581][T17552] xt_hashlimit: max too large, truncated to 1048576 [ 302.079663][T17552] Cannot find set identified by id 0 to match [ 302.099448][T17552] netlink: 'syz.1.5269': attribute type 1 has an invalid length. [ 302.284735][T17579] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5281'. [ 302.347581][T17585] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5284'. [ 302.367385][T17585] IPVS: Unknown mcast interface: syzkaller0 [ 302.440565][T17588] bridge_slave_0: default FDB implementation only supports local addresses [ 302.486970][T17592] netlink: 28 bytes leftover after parsing attributes in process `syz.7.5286'. [ 302.496113][T17592] netlink: 'syz.7.5286': attribute type 7 has an invalid length. [ 302.503916][T17592] netlink: 'syz.7.5286': attribute type 8 has an invalid length. [ 302.511752][T17592] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5286'. [ 302.539501][T17592] gretap0: entered promiscuous mode [ 302.555767][T17592] batadv_slave_1: entered promiscuous mode [ 302.564621][T17592] gretap0: left promiscuous mode [ 302.580667][T17592] batadv_slave_1: left promiscuous mode [ 302.852413][T17630] IPVS: Error joining to the multicast group [ 303.106929][T17655] IPVS: Error joining to the multicast group [ 303.281588][T17687] netlink: 'syz.3.5330': attribute type 33 has an invalid length. [ 303.509800][T17721] netlink: 'syz.7.5346': attribute type 33 has an invalid length. [ 303.753928][T17752] vlan2: entered allmulticast mode [ 303.759104][T17752] bridge_slave_0: entered allmulticast mode [ 303.783090][T17752] bridge_slave_0: left allmulticast mode [ 303.847472][T17757] netlink: 'syz.7.5361': attribute type 33 has an invalid length. [ 303.987398][T17745] vlan3: entered allmulticast mode [ 303.992617][T17745] bridge_slave_0: entered allmulticast mode [ 304.002163][T17745] bridge_slave_0: left allmulticast mode [ 304.082158][T17785] netlink: 'syz.7.5373': attribute type 33 has an invalid length. [ 304.160697][T17789] netlink: 'syz.7.5375': attribute type 39 has an invalid length. [ 304.289222][T17791] vlan2: entered allmulticast mode [ 304.294453][T17791] bridge_slave_0: entered allmulticast mode [ 304.321479][T17791] bridge_slave_0: left allmulticast mode [ 304.371390][ T29] kauditd_printk_skb: 519 callbacks suppressed [ 304.371410][ T29] audit: type=1326 audit(303.899:13219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.401061][ T29] audit: type=1326 audit(303.899:13220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.424180][ T29] audit: type=1326 audit(303.899:13221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.447229][ T29] audit: type=1326 audit(303.899:13222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.470401][ T29] audit: type=1326 audit(303.899:13223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=172 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.493484][ T29] audit: type=1326 audit(303.899:13224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.516661][ T29] audit: type=1326 audit(303.899:13225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.539804][ T29] audit: type=1326 audit(303.899:13226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.563042][ T29] audit: type=1326 audit(303.899:13227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17807 comm="syz.7.5385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 304.649624][ T29] audit: type=1326 audit(304.189:13228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17823 comm="syz.4.5390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 304.692169][T17824] .: (slave bond_slave_0): Releasing backup interface [ 304.719136][T17824] .: (slave bond_slave_1): Releasing backup interface [ 304.774669][T17824] team0: Port device team_slave_0 removed [ 304.808864][T17824] team0: Port device team_slave_1 removed [ 304.828331][T17824] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 304.835904][T17824] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 304.845871][T17824] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 304.853663][T17824] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 305.508880][T17891] rdma_op ffff88814e382580 conn xmit_rdma 0000000000000000 [ 305.516723][T17894] __nla_validate_parse: 20 callbacks suppressed [ 305.516754][T17894] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5415'. [ 305.532118][T17894] netlink: 20 bytes leftover after parsing attributes in process `syz.1.5415'. [ 305.547559][T17893] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5417'. [ 305.556692][T17893] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5417'. [ 305.581309][T17891] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 305.588659][ T3603] IPVS: starting estimator thread 0... [ 305.680083][T17896] IPVS: using max 2304 ests per chain, 115200 per kthread [ 305.756629][T17904] Invalid ELF header magic: != ELF [ 305.779207][T17904] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 305.806338][T17922] netlink: 16 bytes leftover after parsing attributes in process `syz.3.5429'. [ 306.155204][T17970] tipc: New replicast peer: 255.255.255.255 [ 306.161328][T17970] tipc: Enabled bearer , priority 10 [ 306.233500][T17984] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 306.582644][T18023] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5478'. [ 306.665568][T18043] netlink: 'syz.1.5487': attribute type 33 has an invalid length. [ 306.673544][T18043] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5487'. [ 306.940978][T18079] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 307.027659][T18077] bpf_get_probe_write_proto: 20 callbacks suppressed [ 307.027675][T18077] syz.7.5503[18077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.034568][T18077] syz.7.5503[18077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.046053][T18077] syz.7.5503[18077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.087944][T18084] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 307.279942][ T3379] tipc: Node number set to 3766086778 [ 307.388219][T18100] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5512'. [ 307.792244][T18112] syz.4.5516[18112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.792299][T18112] syz.4.5516[18112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.803903][T18112] syz.4.5516[18112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.889042][T18120] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 307.908744][T18120] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 307.981493][T18126] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5523'. [ 308.036071][T18134] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 308.080465][T18138] netlink: 16 bytes leftover after parsing attributes in process `syz.7.5528'. [ 308.142730][T18146] dummy0: entered promiscuous mode [ 308.159098][T18146] xt_HMARK: spi-set and port-set can't be combined [ 308.169976][T18145] dummy0: left promiscuous mode [ 308.410123][T18166] syz.7.5540[18166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.410185][T18166] syz.7.5540[18166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.421773][T18166] syz.7.5540[18166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.437087][T18166] vlan3: entered allmulticast mode [ 308.453647][T18166] bridge_slave_0: entered allmulticast mode [ 308.460609][T18166] bridge_slave_0: left allmulticast mode [ 308.904662][T18216] 9pnet_fd: Insufficient options for proto=fd [ 308.911778][T18216] sctp: [Deprecated]: syz.4.5562 (pid 18216) Use of struct sctp_assoc_value in delayed_ack socket option. [ 308.911778][T18216] Use struct sctp_sack_info instead [ 309.174391][T18240] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 309.209489][T18246] netlink: 'syz.7.5574': attribute type 10 has an invalid length. [ 309.224389][T18246] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 309.375645][T18267] netlink: 'syz.7.5582': attribute type 21 has an invalid length. [ 309.650512][T18283] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 309.702965][ T29] kauditd_printk_skb: 306 callbacks suppressed [ 309.702984][ T29] audit: type=1326 audit(309.249:13535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8bd7b85d29 code=0x0 [ 309.785796][ T29] audit: type=1326 audit(309.329:13536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.818504][ T29] audit: type=1326 audit(309.349:13537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.841555][ T29] audit: type=1326 audit(309.349:13538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.864585][ T29] audit: type=1326 audit(309.349:13539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.887721][ T29] audit: type=1326 audit(309.349:13540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.910785][ T29] audit: type=1326 audit(309.359:13541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.933882][ T29] audit: type=1326 audit(309.359:13542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.956985][ T29] audit: type=1326 audit(309.359:13543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7f8bd7b85d29 code=0x7ffc0000 [ 309.980010][ T29] audit: type=1326 audit(309.359:13544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18284 comm="syz.6.5588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x7ffc0000 [ 310.970819][T18323] rdma_op ffff888121e4fd80 conn xmit_rdma 0000000000000000 [ 310.980785][T18323] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 311.008792][T18325] netlink: 'syz.6.5603': attribute type 33 has an invalid length. [ 311.016713][T18325] __nla_validate_parse: 2 callbacks suppressed [ 311.016758][T18325] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5603'. [ 311.111252][T18333] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5607'. [ 311.139373][T18337] syz.3.5609[18337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.147355][T18337] IPVS: Error joining to the multicast group [ 311.260581][T18344] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5612'. [ 311.448306][T18373] netlink: 'syz.4.5625': attribute type 33 has an invalid length. [ 311.456200][T18373] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5625'. [ 311.677520][T18392] rdma_op ffff888121e4fd80 conn xmit_rdma 0000000000000000 [ 311.685982][T18392] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 312.516636][T18447] netlink: 'syz.3.5659': attribute type 33 has an invalid length. [ 312.524873][T18447] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5659'. [ 312.537663][T18446] bpf_get_probe_write_proto: 5 callbacks suppressed [ 312.537686][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.556912][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.579253][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.647126][T18446] IPVS: Error joining to the multicast group [ 312.685677][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.685823][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.713999][T18446] syz.6.5658[18446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.937922][T18471] netlink: 12 bytes leftover after parsing attributes in process `syz.7.5669'. [ 312.963556][T18473] syz.6.5670[18473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.065369][T18480] rdma_op ffff888117aa4580 conn xmit_rdma 0000000000000000 [ 313.113444][T18480] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 313.381339][T18519] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5676'. [ 314.103461][T18545] syz.6.5686[18545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.103523][T18545] syz.6.5686[18545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.140751][T18545] syz.6.5686[18545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.282237][T18551] netlink: 'syz.3.5688': attribute type 33 has an invalid length. [ 314.301639][T18551] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5688'. [ 314.542306][T18565] rdma_op ffff88810f8bd580 conn xmit_rdma 0000000000000000 [ 314.607144][T18569] IPVS: Error joining to the multicast group [ 314.616671][T18565] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 314.626141][ T3603] IPVS: starting estimator thread 0... [ 314.709109][T18577] SELinux: Context u:r:untrusted_app:s0:c512,c768 is not valid (left unmapped). [ 314.718523][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 314.718540][ T29] audit: type=1400 audit(314.259:13737): avc: denied { relabelto } for pid=18576 comm="syz.7.5700" name=6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0 dev="tmpfs" ino=463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 314.755141][ T29] audit: type=1400 audit(314.259:13738): avc: denied { associate } for pid=18576 comm="syz.7.5700" name=6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0 dev="tmpfs" ino=463 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="u:r:untrusted_app:s0:c512,c768" [ 314.786879][T18571] IPVS: using max 2448 ests per chain, 122400 per kthread [ 314.847342][T18582] netlink: 'syz.7.5702': attribute type 33 has an invalid length. [ 314.855290][T18582] netlink: 8 bytes leftover after parsing attributes in process `syz.7.5702'. [ 314.894718][ T29] audit: type=1400 audit(314.349:13739): avc: denied { read } for pid=18576 comm="syz.7.5700" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 314.926694][ T29] audit: type=1400 audit(314.439:13740): avc: denied { connect } for pid=18583 comm="syz.1.5703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 315.074263][T18596] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 315.200463][T18604] IPVS: Error joining to the multicast group [ 315.379199][T18622] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5720'. [ 315.420713][T18624] rdma_op ffff88810f8bed80 conn xmit_rdma 0000000000000000 [ 315.482364][ T3603] IPVS: starting estimator thread 0... [ 315.491871][T18624] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 315.590058][T18634] IPVS: using max 2448 ests per chain, 122400 per kthread [ 315.653720][ T29] audit: type=1326 audit(315.199:13741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 315.680377][ T29] audit: type=1326 audit(315.219:13742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 315.703504][ T29] audit: type=1326 audit(315.219:13743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 315.726505][ T29] audit: type=1326 audit(315.219:13744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 315.749624][ T29] audit: type=1326 audit(315.219:13745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 315.772699][ T29] audit: type=1326 audit(315.219:13746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18641 comm="syz.7.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 316.049745][T18658] __nla_validate_parse: 2 callbacks suppressed [ 316.056162][T18658] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5730'. [ 316.165398][T18663] 9pnet_fd: Insufficient options for proto=fd [ 316.302203][T18671] netlink: 12 bytes leftover after parsing attributes in process `syz.7.5735'. [ 316.592822][T18685] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5741'. [ 316.827891][T18710] netlink: 12 bytes leftover after parsing attributes in process `syz.7.5749'. [ 316.836961][T18710] netlink: 20 bytes leftover after parsing attributes in process `syz.7.5749'. [ 317.036318][T18724] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5753'. [ 317.231746][T18743] IPVS: Error joining to the multicast group [ 317.512595][T18760] vlan2: entered allmulticast mode [ 317.517951][T18760] bridge_slave_0: entered allmulticast mode [ 317.553673][T18760] bridge_slave_0: left allmulticast mode [ 317.769303][T18778] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5778'. [ 317.778435][T18778] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5778'. [ 317.817644][T18782] bpf_get_probe_write_proto: 21 callbacks suppressed [ 317.817668][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.850097][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.850203][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.865448][T18785] netlink: 'syz.1.5781': attribute type 33 has an invalid length. [ 317.884983][T18785] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5781'. [ 317.909121][T18782] IPVS: Error joining to the multicast group [ 317.925429][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.925511][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.955551][T18782] syz.7.5780[18782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.156771][T18797] vlan3: entered allmulticast mode [ 318.173571][T18797] bridge_slave_0: entered allmulticast mode [ 318.206898][T18797] bridge_slave_0: left allmulticast mode [ 318.287065][T18805] syz.1.5791[18805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.287191][T18805] syz.1.5791[18805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.304066][T18805] syz.1.5791[18805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.366867][T18813] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.422767][T18817] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5792'. [ 318.440318][T18805] IPVS: Error joining to the multicast group [ 318.447032][T18805] syz.1.5791[18805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.532619][T18813] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.681334][T18832] IPVS: Error joining to the multicast group [ 318.723952][T18813] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.787071][T18813] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.818643][T18850] IPVS: Error joining to the multicast group [ 318.943909][T18858] bond0: (slave batadv_slave_0): Releasing backup interface [ 319.006256][T18813] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.303159][T18813] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.441843][T18873] vlan2: entered allmulticast mode [ 319.447077][T18873] bridge_slave_0: entered allmulticast mode [ 319.483681][T18873] bridge_slave_0: left allmulticast mode [ 319.536238][T18876] IPVS: Error joining to the multicast group [ 319.551613][T18813] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.698381][T18813] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 319.733506][T18883] vlan3: entered allmulticast mode [ 319.738689][T18883] bridge_slave_0: entered allmulticast mode [ 319.778641][T18883] bridge_slave_0: left allmulticast mode [ 319.869999][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 319.870015][ T29] audit: type=1326 audit(319.349:13907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 319.899438][ T29] audit: type=1326 audit(319.349:13908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 319.922598][ T29] audit: type=1326 audit(319.349:13909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 319.945566][ T29] audit: type=1326 audit(319.349:13910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 319.968521][ T29] audit: type=1326 audit(319.349:13911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 319.991605][ T29] audit: type=1326 audit(319.349:13912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 320.014710][ T29] audit: type=1326 audit(319.349:13913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 320.037840][ T29] audit: type=1326 audit(319.349:13914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 320.062145][ T29] audit: type=1326 audit(319.349:13915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 320.085216][ T29] audit: type=1326 audit(319.349:13916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18889 comm="syz.4.5824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 320.366915][T18908] vlan3: entered allmulticast mode [ 320.372187][T18908] bridge_slave_0: entered allmulticast mode [ 320.383358][T18910] rdma_op ffff88814e382d80 conn xmit_rdma 0000000000000000 [ 320.407201][T18908] bridge_slave_0: left allmulticast mode [ 320.494916][T18915] IPVS: Error joining to the multicast group [ 320.535031][T18916] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 320.817873][T18941] IPVS: Error joining to the multicast group [ 320.884345][T18943] vlan3: entered allmulticast mode [ 320.889722][T18943] bridge_slave_0: entered allmulticast mode [ 320.909992][T18943] bridge_slave_0: left allmulticast mode [ 321.134769][T18959] netlink: 'syz.1.5855': attribute type 10 has an invalid length. [ 321.204125][T18959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.213469][T18959] team0: Port device bond0 added [ 321.611976][T18976] IPVS: Error joining to the multicast group [ 321.859092][T18980] vlan3: entered allmulticast mode [ 321.864363][T18980] bridge_slave_0: entered allmulticast mode [ 321.887595][T18980] bridge_slave_0: left allmulticast mode [ 322.086789][T18986] IPVS: Error joining to the multicast group [ 322.713646][T19013] IPVS: Error joining to the multicast group [ 323.296853][T19030] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 324.094408][T19065] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 324.472509][T19080] vlan3: entered allmulticast mode [ 324.477690][T19080] bridge_slave_0: entered allmulticast mode [ 324.563696][T19080] bridge_slave_0: left allmulticast mode [ 324.970511][T19104] bpf_get_probe_write_proto: 54 callbacks suppressed [ 324.970530][T19104] syz.6.5914[19104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.002284][T19104] syz.6.5914[19104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.045474][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 325.045535][ T29] audit: type=1326 audit(324.589:14179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.123330][T19104] syz.6.5914[19104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.134064][T19104] IPVS: Error joining to the multicast group [ 325.270571][T19108] syz.6.5914[19108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.270735][T19108] syz.6.5914[19108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.324403][T19111] vlan2: entered allmulticast mode [ 325.341138][T19111] bridge_slave_0: entered allmulticast mode [ 325.364359][ T29] audit: type=1326 audit(324.629:14180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.387794][ T29] audit: type=1326 audit(324.629:14181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.410931][ T29] audit: type=1326 audit(324.629:14182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.433989][ T29] audit: type=1326 audit(324.629:14183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.457322][ T29] audit: type=1326 audit(324.629:14184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.480338][ T29] audit: type=1326 audit(324.629:14185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.503415][ T29] audit: type=1326 audit(324.649:14186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.526455][ T29] audit: type=1326 audit(324.649:14187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.549449][ T29] audit: type=1326 audit(324.649:14188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19105 comm="syz.7.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=312 compat=0 ip=0x7f95ba515d29 code=0x7ffc0000 [ 325.590436][T19108] syz.6.5914[19108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.778960][T19111] bridge_slave_0: left allmulticast mode [ 326.190276][T19122] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 326.630193][T19139] vlan2: entered allmulticast mode [ 326.635465][T19139] bridge_slave_0: entered allmulticast mode [ 326.691637][T19139] bridge_slave_0: left allmulticast mode [ 327.255815][T19172] syz.7.5942[19172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.256789][T19172] syz.7.5942[19172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.317433][T19176] 9pnet_fd: Insufficient options for proto=fd [ 327.371226][T19172] syz.7.5942[19172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.514174][T19180] syz.4.5947[19180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.530423][T19182] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 327.652075][T19180] IPVS: Error joining to the multicast group [ 328.327822][T19208] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 328.569171][T19215] rdma_op ffff888118216580 conn xmit_rdma 0000000000000000 [ 328.599107][T19215] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 337.087449][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 337.087464][ T29] audit: type=1326 audit(336.629:14400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.195138][T19234] bpf_get_probe_write_proto: 8 callbacks suppressed [ 337.195200][T19234] syz.4.5970[19234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.206648][ T29] audit: type=1326 audit(336.669:14401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.241349][ T29] audit: type=1326 audit(336.679:14402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.264942][ T29] audit: type=1326 audit(336.679:14403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.288049][ T29] audit: type=1326 audit(336.679:14404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.311124][ T29] audit: type=1326 audit(336.679:14405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.334216][ T29] audit: type=1326 audit(336.679:14406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.357356][ T29] audit: type=1326 audit(336.679:14407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.380503][ T29] audit: type=1326 audit(336.679:14408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.403733][ T29] audit: type=1326 audit(336.679:14409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19219 comm="syz.3.5965" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 337.443200][T19237] syz.7.5967[19237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.443346][T19237] syz.7.5967[19237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.455109][T19234] syz.4.5970[19234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.466775][T19237] syz.7.5967[19237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.478404][T19234] syz.4.5970[19234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.768516][T19256] __nla_validate_parse: 3 callbacks suppressed [ 337.768603][T19256] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5974'. [ 337.929622][T19261] netlink: 2 bytes leftover after parsing attributes in process `syz.3.5979'. [ 338.162480][T19270] pimreg: entered allmulticast mode [ 338.199577][T19270] pimreg: left allmulticast mode [ 338.223156][T19272] sctp: [Deprecated]: syz.6.5982 (pid 19272) Use of int in maxseg socket option. [ 338.223156][T19272] Use struct sctp_assoc_value instead [ 338.415111][T19284] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 338.488845][T19286] IPv6: Can't replace route, no match found [ 338.726474][T19309] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5989'. [ 338.919939][T19315] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 339.454399][T19333] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 339.733779][T19339] syz.4.6003[19339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.733899][T19339] syz.4.6003[19339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.964823][T19339] netlink: 32 bytes leftover after parsing attributes in process `syz.4.6003'. [ 344.148891][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 344.148910][ T29] audit: type=1326 audit(343.689:14589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.3.6010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 344.231012][T19357] syz.6.6008[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.231161][T19357] syz.6.6008[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.284188][T19365] netlink: 96 bytes leftover after parsing attributes in process `syz.3.6013'. [ 344.329863][ T29] audit: type=1326 audit(343.729:14590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.3.6010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 344.352996][ T29] audit: type=1326 audit(343.729:14591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.3.6010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=229 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 344.376079][ T29] audit: type=1326 audit(343.729:14592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.3.6010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 344.399089][ T29] audit: type=1326 audit(343.729:14593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.3.6010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 347.418485][T19371] xt_TPROXY: Can be used only with -p tcp or -p udp [ 347.502163][T19376] syz.6.6018[19376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.502297][T19376] syz.6.6018[19376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.532149][ T29] audit: type=1400 audit(347.039:14594): avc: denied { getopt } for pid=19368 comm="syz.4.6017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 347.567836][T19376] syz.6.6018[19376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.577932][T19376] IPVS: Error joining to the multicast group [ 347.653502][ T29] audit: type=1326 audit(347.189:14595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19377 comm="syz.3.6019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 347.676592][ T29] audit: type=1326 audit(347.189:14596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19377 comm="syz.3.6019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 347.699672][ T29] audit: type=1326 audit(347.189:14597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19377 comm="syz.3.6019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 347.722808][ T29] audit: type=1326 audit(347.189:14598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19377 comm="syz.3.6019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 347.897742][T19393] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 347.958338][T19396] vlan3: entered allmulticast mode [ 347.963555][T19396] bridge_slave_0: entered allmulticast mode [ 347.993162][T19398] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 348.025044][T19396] bridge_slave_0: left allmulticast mode [ 348.106512][T19405] syz.6.6026[19405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.106627][T19405] syz.6.6026[19405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.405424][T19415] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 348.425877][T19419] 9pnet_virtio: no channels available for device 127.0.0.1 [ 348.585688][T19429] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 348.643226][T19431] syz.3.6037[19431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.643334][T19431] syz.3.6037[19431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.686542][T19431] syz.3.6037[19431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.754737][T19433] vlan3: entered allmulticast mode [ 348.771454][T19433] bridge_slave_0: entered allmulticast mode [ 348.803379][T19433] bridge_slave_0: left allmulticast mode [ 348.824188][T19431] IPVS: Error joining to the multicast group [ 348.929366][T19439] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6039'. [ 349.265526][T19458] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 349.377121][T19460] netlink: 'syz.4.6048': attribute type 1 has an invalid length. [ 349.409192][T19463] pimreg: entered allmulticast mode [ 349.442135][T19463] pimreg: left allmulticast mode [ 349.753825][T19485] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 349.976843][T19491] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 350.117445][T19499] mmap: syz.7.6061 (19499): VmData 167751680 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 350.144700][T19498] vlan3: entered allmulticast mode [ 350.149884][T19498] bridge_slave_0: entered allmulticast mode [ 350.193464][T19498] bridge_slave_0: left allmulticast mode [ 350.233214][T19501] netlink: 96 bytes leftover after parsing attributes in process `syz.3.6064'. [ 350.436419][T19510] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6065'. [ 350.849778][T19522] netlink: 'syz.6.6071': attribute type 1 has an invalid length. [ 350.880556][T19524] bpf_get_probe_write_proto: 3 callbacks suppressed [ 350.880579][T19524] syz.4.6072[19524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.912092][T19524] syz.4.6072[19524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.975996][T19524] syz.4.6072[19524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.040285][T19536] IPVS: Error joining to the multicast group [ 351.153904][T19544] netlink: 20 bytes leftover after parsing attributes in process `syz.6.6077'. [ 351.299707][T19552] syz.3.6079[19552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.300205][T19552] syz.3.6079[19552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.356019][T19554] netlink: 76 bytes leftover after parsing attributes in process `+}[@'. [ 351.376238][T19552] syz.3.6079[19552] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.748955][T19574] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6088'. [ 352.247018][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 352.247034][ T29] audit: type=1326 audit(351.789:14765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.276275][ T29] audit: type=1326 audit(351.789:14766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.299340][ T29] audit: type=1326 audit(351.789:14767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.322365][ T29] audit: type=1326 audit(351.789:14768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.350542][T19589] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6095'. [ 352.468792][T19592] netlink: 'syz.4.6096': attribute type 33 has an invalid length. [ 352.476733][T19592] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6096'. [ 352.700261][T19603] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6101'. [ 352.725560][ T29] audit: type=1326 audit(351.889:14769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.748771][ T29] audit: type=1326 audit(351.889:14770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.771840][ T29] audit: type=1326 audit(351.899:14771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=188 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.794937][ T29] audit: type=1326 audit(351.899:14772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.817950][ T29] audit: type=1326 audit(351.899:14773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=197 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.840959][ T29] audit: type=1326 audit(351.899:14774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19584 comm="syz.4.6095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0247195d29 code=0x7ffc0000 [ 352.878740][T19605] IPVS: Error joining to the multicast group [ 353.063331][T19615] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 353.253405][T19627] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 353.423613][T19638] IPVS: Error joining to the multicast group [ 353.545588][T19647] pimreg: entered allmulticast mode [ 353.566482][T19647] pimreg: left allmulticast mode [ 353.651916][T19658] netlink: 76 bytes leftover after parsing attributes in process `+}[@'. [ 354.565303][T19679] IPVS: Error joining to the multicast group [ 354.937755][T19694] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6134'. [ 355.092504][T19701] vlan3: entered allmulticast mode [ 355.097704][T19701] bridge_slave_0: entered allmulticast mode [ 355.125674][T19701] bridge_slave_0: left allmulticast mode [ 355.537143][T19738] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6146'. [ 355.567069][T19739] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6147'. [ 355.681434][T19744] IPVS: Error joining to the multicast group [ 355.846057][T19757] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6156'. [ 356.262948][T19783] IPVS: Error joining to the multicast group [ 356.330655][T19790] netlink: 96 bytes leftover after parsing attributes in process `syz.1.6170'. [ 356.623625][T19810] syz.7.6177[19810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.623687][T19810] syz.7.6177[19810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.283496][T19826] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6186'. [ 358.010976][T19841] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6193'. [ 358.065193][T19845] vlan2: entered allmulticast mode [ 358.070457][T19845] bridge_slave_0: entered allmulticast mode [ 358.100020][T19845] bridge_slave_0: left allmulticast mode [ 358.223624][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 358.223651][ T29] audit: type=1326 audit(357.769:14848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19853 comm="syz.3.6199" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f04332f5d29 code=0x0 [ 358.282308][T19857] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6200'. [ 358.341638][ T29] audit: type=1326 audit(357.889:14849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19863 comm="syz.1.6202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22be1d5d29 code=0x7ffc0000 [ 358.385122][ T29] audit: type=1326 audit(357.919:14850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19863 comm="syz.1.6202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22be1d5d29 code=0x7ffc0000 [ 358.562544][T19886] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 358.598302][T19888] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6210'. [ 359.371349][T19925] netlink: 96 bytes leftover after parsing attributes in process `syz.3.6224'. [ 359.681942][T19935] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6226'. [ 360.134842][ T29] audit: type=1400 audit(359.679:14851): avc: denied { getopt } for pid=19954 comm="syz.6.6235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 360.715889][T19971] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6240'. [ 360.975174][T19974] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6241'. [ 361.161265][T19987] netlink: 'syz.1.6238': attribute type 7 has an invalid length. [ 361.169054][T19987] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6238'. [ 361.264396][T19987] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6238'. [ 361.308031][T19987] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6238'. [ 361.434549][ T29] audit: type=1326 audit(360.969:14852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 361.457693][ T29] audit: type=1326 audit(360.979:14853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 361.480701][ T29] audit: type=1326 audit(360.979:14854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 361.550927][T20003] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6249'. [ 361.562126][T20005] netlink: 'syz.7.6250': attribute type 33 has an invalid length. [ 361.570046][T20005] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6250'. [ 361.609262][ T29] audit: type=1326 audit(361.059:14855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f04332f4690 code=0x7ffc0000 [ 361.632425][ T29] audit: type=1326 audit(361.059:14856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 361.655545][ T29] audit: type=1326 audit(361.059:14857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19997 comm="syz.3.6248" exe="/root/syz-executor" sig=0 arch=c000003e syscall=246 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 361.694303][T20010] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 361.983716][T20027] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6259'. [ 363.253275][T20072] netlink: 'syz.1.6276': attribute type 33 has an invalid length. [ 363.261350][T20072] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6276'. [ 363.471908][T20079] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 363.494130][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.494258][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.508394][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.531125][T20081] IPVS: Error joining to the multicast group [ 363.553918][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.554053][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.567087][T20081] syz.6.6280[20081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.605370][T20085] netlink: 96 bytes leftover after parsing attributes in process `syz.6.6281'. [ 363.703369][T20091] syz.6.6284[20091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.703515][T20091] syz.6.6284[20091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.716579][T20091] syz.6.6284[20091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.782669][T20095] syz.3.6286[20095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.948460][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 363.948476][ T29] audit: type=1326 audit(363.489:14944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 363.996567][ T29] audit: type=1326 audit(363.539:14945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.019875][ T29] audit: type=1326 audit(363.539:14946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.042971][ T29] audit: type=1326 audit(363.539:14947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.065927][ T29] audit: type=1326 audit(363.539:14948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.089076][ T29] audit: type=1326 audit(363.539:14949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.112250][ T29] audit: type=1326 audit(363.539:14950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.117332][T20109] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.135388][ T29] audit: type=1326 audit(363.539:14951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.165850][ T29] audit: type=1326 audit(363.539:14952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.188936][ T29] audit: type=1326 audit(363.539:14953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20103 comm="syz.3.6290" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04332f5d29 code=0x7ffc0000 [ 364.260153][T20121] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.349395][T20130] netlink: 'syz.3.6302': attribute type 33 has an invalid length. [ 364.370959][T20134] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.545924][T20156] vlan3: entered allmulticast mode [ 364.551317][T20156] bridge_slave_0: entered allmulticast mode [ 364.558904][T20156] bridge_slave_0: left allmulticast mode [ 364.587447][T20160] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.612634][T20164] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.798483][T20187] netlink: 'syz.4.6326': attribute type 3 has an invalid length. [ 364.864256][T20194] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 364.892460][T20196] vlan3: entered allmulticast mode [ 364.897682][T20196] bridge_slave_0: entered allmulticast mode [ 364.905893][T20196] bridge_slave_0: left allmulticast mode [ 365.232094][T20217] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 365.350651][T20234] netlink: 'syz.6.6347': attribute type 33 has an invalid length. [ 365.538789][T20246] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 365.697275][T20270] pimreg: entered allmulticast mode [ 365.703463][T20270] pimreg: left allmulticast mode [ 365.727216][T20274] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 365.762222][T20277] pimreg: entered allmulticast mode [ 365.769629][T20277] pimreg: left allmulticast mode [ 365.922984][T20300] 9pnet_fd: Insufficient options for proto=fd [ 365.936829][T20304] __nla_validate_parse: 7 callbacks suppressed [ 365.936850][T20304] netlink: 16 bytes leftover after parsing attributes in process `syz.4.6375'. [ 365.952163][T20304] tc_dump_action: action bad kind [ 365.954183][T20306] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 366.005193][T20309] IPVS: Error joining to the multicast group [ 366.104712][T20327] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6384'. [ 366.353047][T20370] netlink: 'syz.4.6400': attribute type 33 has an invalid length. [ 366.361031][T20370] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6400'. [ 366.391207][T20374] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6402'. [ 366.400745][T20374] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6402'. [ 366.427100][T14451] ================================================================== [ 366.435237][T14451] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 366.442771][T14451] [ 366.445108][T14451] read-write to 0xffff888118227d18 of 8 bytes by task 20375 on cpu 0: [ 366.453289][T14451] shmem_recalc_inode+0x36/0x1b0 [ 366.458253][T14451] shmem_get_folio_gfp+0x7ce/0xd90 [ 366.463396][T14451] shmem_write_begin+0xa2/0x180 [ 366.468272][T14451] generic_perform_write+0x1a8/0x4a0 [ 366.473591][T14451] shmem_file_write_iter+0xc2/0xe0 [ 366.478736][T14451] __kernel_write_iter+0x24b/0x4e0 [ 366.483875][T14451] dump_user_range+0x3ac/0x550 [ 366.488685][T14451] elf_core_dump+0x1bdc/0x1ce0 [ 366.493488][T14451] do_coredump+0x1898/0x1f40 [ 366.498104][T14451] get_signal+0xd4f/0x1000 [ 366.502557][T14451] arch_do_signal_or_restart+0x95/0x4b0 [ 366.508135][T14451] irqentry_exit_to_user_mode+0xa7/0x120 [ 366.513803][T14451] irqentry_exit+0x12/0x50 [ 366.518289][T14451] exc_general_protection+0x33d/0x4d0 [ 366.523685][T14451] asm_exc_general_protection+0x26/0x30 [ 366.529354][T14451] [ 366.531696][T14451] read to 0xffff888118227d18 of 8 bytes by task 14451 on cpu 1: [ 366.539350][T14451] shmem_getattr+0x42/0x200 [ 366.543895][T14451] vfs_statx_path+0x171/0x2d0 [ 366.548609][T14451] vfs_statx+0xe1/0x170 [ 366.552785][T14451] __se_sys_newfstatat+0xdc/0x300 [ 366.557848][T14451] __x64_sys_newfstatat+0x55/0x70 [ 366.562902][T14451] x64_sys_call+0x236d/0x2dc0 [ 366.567600][T14451] do_syscall_64+0xc9/0x1c0 [ 366.572131][T14451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.578078][T14451] [ 366.580416][T14451] value changed: 0x000000000000015a -> 0x000000000000015c [ 366.587582][T14451] [ 366.589983][T14451] Reported by Kernel Concurrency Sanitizer on: [ 366.596176][T14451] CPU: 1 UID: 0 PID: 14451 Comm: syz-executor Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 366.607134][T14451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 366.617218][T14451] ================================================================== [ 366.651393][T20378] vlan3: entered promiscuous mode [ 366.656757][T20378] bond0: entered promiscuous mode [ 366.662790][T20378] team0: Port device vlan3 added