last executing test programs: 10m25.969603625s ago: executing program 0 (id=504): r0 = socket$inet6(0xa, 0x80002, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) 10m25.659506034s ago: executing program 0 (id=505): r0 = socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000500)) 10m25.320768484s ago: executing program 0 (id=507): sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="14"], 0x14}, 0x1, 0x0, 0x0, 0x8081}, 0x24000800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) 10m24.882327827s ago: executing program 0 (id=509): r0 = socket$inet6(0xa, 0x80002, 0x88) ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) 10m24.721897492s ago: executing program 0 (id=511): r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000500)) 10m24.409243251s ago: executing program 0 (id=513): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="b601000000000000bd110000000000008510000002000000850000007600000095000000000000009500a5050000000077d8f3b4000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d75357f21699cdc6751dfb265a0e3ccae669e173a649c1cfd6587d472d64e7cc955d77578f4c35235138d5421f9453559c35da860e8ef14142b2a3e314422b854421eed734ceb1efeecb9c66854c3b3ffe1b4ce25d7c983c005c03bf3a48dfe3e26e7a23129d6606fd28a697a9d552af6d9a9df2c3af333e2008e11bbec0727cb3f647535deb6277f5696833a71011a7d06602e2fd5234712596b696418f163d1a13ed38a682f87925bfa753f631cd027edd68149ee99eebc6f7d6dd4ae59af7588c8e1f4efab57644ccb1973d7879b70a70001040000000000000000d7900a820b63278f4e9a217b98ef7042ad2a923132f208fd8289eaf8cd00000000000009d27d753a300800000000000000a5686f2fccc33e3e34c3969c5ad781302d40e97a8ad10ce0cbe17366d5ac6af2fca2360a15b80400d52040ef7b28d300747877e176fe4c4b8e40dbf260f5a9f7eee30293c1b163b795d0aef4deb851a30000f569dc8f39943f889008e1ec914faa9e6cd0b3b4b3b5db666ebeb49d6a62019d76459e70b459543c4ac42e53b4ad4c77cff373ebd95848f01864e456969cd28000170996016aceb583df5ee4dd722e8c350af489f9a900000000a0dcc36b3d7c734a9cce0439f832a20d7cbdcda5dff3ba92dd66afb9d74aa222038994dcd3e7784dbea1e51a15b0f1a040cc63177f8fafa3192fc8e5552da1a982ab8dfe31ad1a0968faa47c2069d6bf09c3aa4f0fc128cb578d99b08a150b4cc4b22f6a464c6398c952519818a44a1b223ff502df87865c276588ea478e328e8277e811b99ce1acfecaf8e2c55ccc4b8eae0a61635514e99ffd438784060f23ba74c0b30b1180d935832deb686d789ba1d436d116394534e88492a42b8bf050c719661a2dc50b3a1dcfbc871e5c27e3d7260f6fa589e40000b89db451ff994845f6b49c12e89291398bcb3c06ef1289f74e0b0e2cab592d35f82a69e7284223a171c616b1f0fee6c4711d7aecb69746064d2c096554975d605ebe646302bf3d5cf32a9a09915ae3f3d4eb96615d7b237da56cd5e9904a19e145f25b6d98eb2c019967f553b61d0e80d6913cee9f8d18469a654a239a84a85debbc02846ac5791278f18c6759e3b513a68284d2efc30587e433431b2896a3bd48020af67e9ac071b2dd6dc3b9efae4ff03558fa619aea909c7f2416e7e7da1c51ccc7e6ac27412f728dc6d80da8adf317ca863ed683897321f8c8bb5a5d953d6783b7a06353ee496bbdff418de3e53234df87756eb99e330253cf5da4aa1a9648a38f07e2d302b4165983db4f7b8972923fffa8c03c288512a3a38fbd7c816a44634f7a03fab30811b7b93257bea4369ba46024dee5e9b0b2c3d3324e9b7c1f99ab9bb3f498b1485373b79ec84a67dad4e37575dab87ce55a9a69ed856a4c4410d1242ac1bd1539094a641cc086c2c53e363beafc74ab4e9ff320373705cbf5644586ffe60d293944fa2d9dc18b55f1af5c42f27747bef1ffd0c1766f062d47d61bf9f64e6ee288fa7fc12d48da526527b9f5c318c93ec447cb8b5eee7aa8a1e85696af3dfef96657c0545c8ebd96528d9c28828e5befd80d684b03b6d153da3e3cbd3bfbf4a9375b8ad04a1d241bcb5d5505cb6cc7a44e2e24bd0b1ca4879caaff59d0ce39dc7f3fea447f4e46967855208e63ec988bd2692afefbed2b001205e4b30ee8fe417defa566a73ace8f01f7181de0ef25f1744896a3c38859e6148c42454949cd64b1a888e7fe9c2d86bb01023b6ddeb67f5eb038af3e460c771518a4126c338b0390d459361e03adf6e6b558b3651a0e33d101b5febfff82794203da18db6fcf89715c2d338f78d8b9220171b41f528f857a7cb79ca990de1208777e13faaa9b9cb9e67797b07d9eb9e909410b50c5d981d9a72aa36498b630519d1530ef0000000000000000000037fcffffffffffffff8db8379bd2044c652dff399a9f8bfa4e9c507f049d18837464276830461ee203ba51f6102d262fc9a26bc3638ecce24e65c55da6efaa462f03d0e119c963a8c7a522b59f5a7b44d018cb2648383073d9e032492cae44350bc0a85697f431392eb22cae093e85954af97d6d7b2e6e8f43353062275ad1578a431594243452a2bfb89f91d8eaac038e9e17136e7c698f73faaabb3d00000000000080014573789425c4c32da528d89356aa6d2ae6da082e756c80cf39053431080ea6cbf9997a5a0ddad0b9d12bc3f880476ab32f0feaac5f16e61f7b72b8c9082eec423c6b3eaecfdcc9ec72795e7696421c83b76c2d6bac19bc875d009679778d8ef97d7e05329649d97b0dc54bea9b650873de2d3d702690176e0b23ee5cb5e469a8d1612d611722e6200e3a297d92f8e1de98326c5ef2b89d4e2d47767cd755783e5d865e373338e96ceb8399f296c59b2d70ca27735ecaff62982616d3ac1ab041733bce119d8002a6c8a2b08b32551b2313b1a2ff41b3f04af61c69c85cb2da48215727271bac2ffdeb62d9f5dc4845f1c3f63dc806e615ee8d28d6d7f181e30807afa27f41d0364c746a65a47464db68f3c433d88dd625db35fded2c86d75af88efaf20c8b37c644b6c4e773a9589200faa553bc92f916b75ddbfa18ab73979f46947b35914286d2499a0b8c970000000000000000f4fe74e0c26ab52329bd600627b256ca44dd121ffc8dbb6e5f70cbe03efccac70375b30cc927574d254d1b46c607e8b1ca7d1511568c3ef4b6b885f4582bdcef74e5e010627fc8e4fe00000000000000000000869d9640f06b11df2971909b90133983308ea4f033de613763f32d913bcbe9dd082a6fff197a20730269e6cfd31275395833f1c2b8a50a94c30cceae2a11fe9b9b835d0da73891c0b3ce22dea6bf31e7f51808cf72f44b4455b77a778440795e152dc1b7bb0a5636aa4742ce4d331a47de5836539cdf289176527277b70c8162aaf6f9475418b478329f3565450acfaf07000000eab8cabfa97e35081967bb92a264b07e8003d2f15537e72a1e4ca5ec1e2aaaf8236ecdefbaf512c75e636b6b6f518ad20521f909b12e9bc97e408e0dc82f950d12705f35708bc862196abb27e8d7991b5273987f38c4706289ff4f6130cee76465d487a07a74452f87da2029bd3debd9870335d58d3fe1ac80574fa3ea312997ab81bc6f569ffdb10ba3f20a86d95128d13e0c778998d3b3114bfb07bd61e4bff8a5e2ce4aa572c63e09b44ca4a181bcfe4eec3ce843c65c4948169fe639a186acc2b4a96c6b8d4d2e6d53ab97bea01eab953e6e89e3af34d4ada217bc6fda0fb2095c49195d0d6f365ca80a955b9ec81240a84ef672afa369fc8e3d444ba35d0f51a0065a3b982d09dfc6874fc0d8079b185447cb8a695e132d4d613a529d9c77e2a8f7320ecf698e8a2b170fd601dc1a9767a38b10788e92d1356f6a6c1bcfb2d31b46e735db13f1be80bac1b6be04fd98610000000000000000000000000000139af5493f74751c5e2501a4936bc4a0fa516117f4ccadc692003adee0a080eba2f1059660c0ee0e9aec72d4d0fe095632e4f641b0e34c611c5b3e0ba05fa36542d40837dda323910672a9097d68398fd3539686e4288db0d6bf7cb8a1835f46dfe11865a66ef47e736dada06677a5bca133d6cbc8fe5c4557e51b006bdccd7c5f32ff1d9e8b130f77df09236870fb3de5b87b4f8acc13df534eba329b86670000000000000000b27a2616c03cdf6c009447a652bca9b325e73c0737d5b717945e4fe7a169c5e2c54fc71a4104aa7cf0f5d30e2fcd9503650edbd8a5971a9a1fde5e5df37469ae204a6e899eacc1e63034cbabc5604739881cb82604bed3e53696a0606b26b879ef232a1a038291389593d1575cb79aa8284cf01a7e1a456acab9d8d608ad69d4c4b56492af7004e7ed9d47c5db3d76a00bea7c804f3a3638408bc1636f1009b7f185f51606918eaa0ab6bef11ae3d300"], &(0x7f0000000080)='GPL\x00', 0x9, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 9m39.477107182s ago: executing program 32 (id=513): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="b601000000000000bd110000000000008510000002000000850000007600000095000000000000009500a5050000000077d8f3b4000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d75357f21699cdc6751dfb265a0e3ccae669e173a649c1cfd6587d472d64e7cc955d77578f4c35235138d5421f9453559c35da860e8ef14142b2a3e314422b854421eed734ceb1efeecb9c66854c3b3ffe1b4ce25d7c983c005c03bf3a48dfe3e26e7a23129d6606fd28a697a9d552af6d9a9df2c3af333e2008e11bbec0727cb3f647535deb6277f5696833a71011a7d06602e2fd5234712596b696418f163d1a13ed38a682f87925bfa753f631cd027edd68149ee99eebc6f7d6dd4ae59af7588c8e1f4efab57644ccb1973d7879b70a70001040000000000000000d7900a820b63278f4e9a217b98ef7042ad2a923132f208fd8289eaf8cd00000000000009d27d753a300800000000000000a5686f2fccc33e3e34c3969c5ad781302d40e97a8ad10ce0cbe17366d5ac6af2fca2360a15b80400d52040ef7b28d300747877e176fe4c4b8e40dbf260f5a9f7eee30293c1b163b795d0aef4deb851a30000f569dc8f39943f889008e1ec914faa9e6cd0b3b4b3b5db666ebeb49d6a62019d76459e70b459543c4ac42e53b4ad4c77cff373ebd95848f01864e456969cd28000170996016aceb583df5ee4dd722e8c350af489f9a900000000a0dcc36b3d7c734a9cce0439f832a20d7cbdcda5dff3ba92dd66afb9d74aa222038994dcd3e7784dbea1e51a15b0f1a040cc63177f8fafa3192fc8e5552da1a982ab8dfe31ad1a0968faa47c2069d6bf09c3aa4f0fc128cb578d99b08a150b4cc4b22f6a464c6398c952519818a44a1b223ff502df87865c276588ea478e328e8277e811b99ce1acfecaf8e2c55ccc4b8eae0a61635514e99ffd438784060f23ba74c0b30b1180d935832deb686d789ba1d436d116394534e88492a42b8bf050c719661a2dc50b3a1dcfbc871e5c27e3d7260f6fa589e40000b89db451ff994845f6b49c12e89291398bcb3c06ef1289f74e0b0e2cab592d35f82a69e7284223a171c616b1f0fee6c4711d7aecb69746064d2c096554975d605ebe646302bf3d5cf32a9a09915ae3f3d4eb96615d7b237da56cd5e9904a19e145f25b6d98eb2c019967f553b61d0e80d6913cee9f8d18469a654a239a84a85debbc02846ac5791278f18c6759e3b513a68284d2efc30587e433431b2896a3bd48020af67e9ac071b2dd6dc3b9efae4ff03558fa619aea909c7f2416e7e7da1c51ccc7e6ac27412f728dc6d80da8adf317ca863ed683897321f8c8bb5a5d953d6783b7a06353ee496bbdff418de3e53234df87756eb99e330253cf5da4aa1a9648a38f07e2d302b4165983db4f7b8972923fffa8c03c288512a3a38fbd7c816a44634f7a03fab30811b7b93257bea4369ba46024dee5e9b0b2c3d3324e9b7c1f99ab9bb3f498b1485373b79ec84a67dad4e37575dab87ce55a9a69ed856a4c4410d1242ac1bd1539094a641cc086c2c53e363beafc74ab4e9ff320373705cbf5644586ffe60d293944fa2d9dc18b55f1af5c42f27747bef1ffd0c1766f062d47d61bf9f64e6ee288fa7fc12d48da526527b9f5c318c93ec447cb8b5eee7aa8a1e85696af3dfef96657c0545c8ebd96528d9c28828e5befd80d684b03b6d153da3e3cbd3bfbf4a9375b8ad04a1d241bcb5d5505cb6cc7a44e2e24bd0b1ca4879caaff59d0ce39dc7f3fea447f4e46967855208e63ec988bd2692afefbed2b001205e4b30ee8fe417defa566a73ace8f01f7181de0ef25f1744896a3c38859e6148c42454949cd64b1a888e7fe9c2d86bb01023b6ddeb67f5eb038af3e460c771518a4126c338b0390d459361e03adf6e6b558b3651a0e33d101b5febfff82794203da18db6fcf89715c2d338f78d8b9220171b41f528f857a7cb79ca990de1208777e13faaa9b9cb9e67797b07d9eb9e909410b50c5d981d9a72aa36498b630519d1530ef0000000000000000000037fcffffffffffffff8db8379bd2044c652dff399a9f8bfa4e9c507f049d18837464276830461ee203ba51f6102d262fc9a26bc3638ecce24e65c55da6efaa462f03d0e119c963a8c7a522b59f5a7b44d018cb2648383073d9e032492cae44350bc0a85697f431392eb22cae093e85954af97d6d7b2e6e8f43353062275ad1578a431594243452a2bfb89f91d8eaac038e9e17136e7c698f73faaabb3d00000000000080014573789425c4c32da528d89356aa6d2ae6da082e756c80cf39053431080ea6cbf9997a5a0ddad0b9d12bc3f880476ab32f0feaac5f16e61f7b72b8c9082eec423c6b3eaecfdcc9ec72795e7696421c83b76c2d6bac19bc875d009679778d8ef97d7e05329649d97b0dc54bea9b650873de2d3d702690176e0b23ee5cb5e469a8d1612d611722e6200e3a297d92f8e1de98326c5ef2b89d4e2d47767cd755783e5d865e373338e96ceb8399f296c59b2d70ca27735ecaff62982616d3ac1ab041733bce119d8002a6c8a2b08b32551b2313b1a2ff41b3f04af61c69c85cb2da48215727271bac2ffdeb62d9f5dc4845f1c3f63dc806e615ee8d28d6d7f181e30807afa27f41d0364c746a65a47464db68f3c433d88dd625db35fded2c86d75af88efaf20c8b37c644b6c4e773a9589200faa553bc92f916b75ddbfa18ab73979f46947b35914286d2499a0b8c970000000000000000f4fe74e0c26ab52329bd600627b256ca44dd121ffc8dbb6e5f70cbe03efccac70375b30cc927574d254d1b46c607e8b1ca7d1511568c3ef4b6b885f4582bdcef74e5e010627fc8e4fe00000000000000000000869d9640f06b11df2971909b90133983308ea4f033de613763f32d913bcbe9dd082a6fff197a20730269e6cfd31275395833f1c2b8a50a94c30cceae2a11fe9b9b835d0da73891c0b3ce22dea6bf31e7f51808cf72f44b4455b77a778440795e152dc1b7bb0a5636aa4742ce4d331a47de5836539cdf289176527277b70c8162aaf6f9475418b478329f3565450acfaf07000000eab8cabfa97e35081967bb92a264b07e8003d2f15537e72a1e4ca5ec1e2aaaf8236ecdefbaf512c75e636b6b6f518ad20521f909b12e9bc97e408e0dc82f950d12705f35708bc862196abb27e8d7991b5273987f38c4706289ff4f6130cee76465d487a07a74452f87da2029bd3debd9870335d58d3fe1ac80574fa3ea312997ab81bc6f569ffdb10ba3f20a86d95128d13e0c778998d3b3114bfb07bd61e4bff8a5e2ce4aa572c63e09b44ca4a181bcfe4eec3ce843c65c4948169fe639a186acc2b4a96c6b8d4d2e6d53ab97bea01eab953e6e89e3af34d4ada217bc6fda0fb2095c49195d0d6f365ca80a955b9ec81240a84ef672afa369fc8e3d444ba35d0f51a0065a3b982d09dfc6874fc0d8079b185447cb8a695e132d4d613a529d9c77e2a8f7320ecf698e8a2b170fd601dc1a9767a38b10788e92d1356f6a6c1bcfb2d31b46e735db13f1be80bac1b6be04fd98610000000000000000000000000000139af5493f74751c5e2501a4936bc4a0fa516117f4ccadc692003adee0a080eba2f1059660c0ee0e9aec72d4d0fe095632e4f641b0e34c611c5b3e0ba05fa36542d40837dda323910672a9097d68398fd3539686e4288db0d6bf7cb8a1835f46dfe11865a66ef47e736dada06677a5bca133d6cbc8fe5c4557e51b006bdccd7c5f32ff1d9e8b130f77df09236870fb3de5b87b4f8acc13df534eba329b86670000000000000000b27a2616c03cdf6c009447a652bca9b325e73c0737d5b717945e4fe7a169c5e2c54fc71a4104aa7cf0f5d30e2fcd9503650edbd8a5971a9a1fde5e5df37469ae204a6e899eacc1e63034cbabc5604739881cb82604bed3e53696a0606b26b879ef232a1a038291389593d1575cb79aa8284cf01a7e1a456acab9d8d608ad69d4c4b56492af7004e7ed9d47c5db3d76a00bea7c804f3a3638408bc1636f1009b7f185f51606918eaa0ab6bef11ae3d300"], &(0x7f0000000080)='GPL\x00', 0x9, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 8m59.435924389s ago: executing program 1 (id=658): r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = dup2(r2, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r3}, 0x10) close(r0) r4 = inotify_init1(0x800) fcntl$setstatus(r0, 0x4, 0x2c00) r5 = gettid() fcntl$setown(r0, 0x8, r5) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r4, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') 8m58.220069705s ago: executing program 1 (id=661): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x80000000, {0x0, 0x0, 0x0, r3, {0x1}, {0x0, 0xffff}}}, 0x24}}, 0x0) 8m57.899118694s ago: executing program 1 (id=663): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) unshare(0x20040600) 8m57.532460584s ago: executing program 1 (id=664): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x103, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440), 0x440, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYRES8=r3], 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r4, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x0, 0x0}) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r5, 0x541c, &(0x7f0000000000)) 8m56.940428362s ago: executing program 1 (id=665): sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000010240)={0x0, 0x0, &(0x7f0000010200)={&(0x7f00000001c0)={0x10020, 0x3f7, 0x0, 0x0, 0x0, {0xffff, 0x7, './file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa', './file0'}}, 0x10020}}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0xf8, r2, 0x1, 0x0, 0x6, @local}, 0x14) bind$packet(r1, &(0x7f0000000100)={0x11, 0x4, r2}, 0x14) syz_emit_ethernet(0x11, &(0x7f0000001f00)=ANY=[], 0x0) 8m56.731217658s ago: executing program 1 (id=666): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 8m11.531307657s ago: executing program 33 (id=666): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000e868495fb58d00b6ad1f50ad32d6ad25dfd73a015e0ca6a0f68a7d007dc6751dfb265a0e3ccae669e173a64bc1cfd514600650a58f145ff1205fc9ddaa275e687d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983cd44c05bd0a48dfe3e26e7a23129d6606ed28a69989d552af6d9a9df2c3af36e0360070011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a1a83109753f54b21cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b81a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a928903000000cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba739cd0c31b05c00fba8a4aee676d7caa2e53b91a68ff2e60da7b01a2e5785a238afa4aba70c08b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf78b04963d679d5a5d07e618a1ef9057fec00f9e93021f5a8d30e716de8cde9c6000000000c3b64d10f0939b42b33ab2a8717096c58bb3bb1d457d8bb96870f5a7e2ba31fd69bb80235ca57eaa9a40b76b8fc81ffa604aaafb76a980e72b408f686b185736693089213b4e140f8f38e5589663115f13889deb646122a5dc5a9e5ba4d37749a36b880110e2bf524b79bc91105f1d3f7d0de694e9417d68694f17ba5e27ea1cec518b93fadcfe0deb70ae9be3273ff73c34f5695080a35bfa5c69e3b533e1b939c81b3beda037b7191cb0000000000000000000010e5d683b8938db5c305cf7e6e62a6890ba9e1f4ee64f8202b59de5036569febfaa95f4633db108b2f786333ec7bacc927f4a1785165b5d2444b4c022bb5cff472e6a0c8ee9d6d8df83b704669147b732ac508c9b9f0ca0a1ce45319d43d4643eb285835daf2065b57bebd61ad6671296c27253a5f9688d57c91ccd40ffe2dbc5dd1613a2e6f5b363cc8d205ce6eb3c3c6ded7dd3dfdb39008d8997213f68cdc971c1d6fdacb7729a5560880a77525e9cfb94ef1735dfe74e6b948697f7e3580436b532a82e315d56b17a5dba98436282c91f5d0fc4ec525933381e84d625b41c71de6befdceb5f929ae199c2a1220413e97b41209c6a626d304f8849c4799fd28bb65c9282b8da7188b389518d46b46e0db497b51fe6d22fe6750bee32e9788dbcd079a322897fc005953066abc60356984918a586213"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x40040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 6m9.28134244s ago: executing program 3 (id=984): execve(0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000280)=ANY=[], 0x60) 6m8.743543046s ago: executing program 3 (id=987): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x1a1281) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f00000000c0)={0xfc46, 0x2, [{0x8}, {0xf}]}) 6m8.61090574s ago: executing program 3 (id=988): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_open_dev$loop(&(0x7f0000000000), 0x7, 0x86100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x275a, 0x0) write$binfmt_misc(r3, &(0x7f0000001000), 0xe09) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000d80)={r3, 0x1000, {0x2a00, 0x80010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea89de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c559265406c09306003d8002000", [0x0, 0x2]}}) 6m8.018839637s ago: executing program 3 (id=989): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f00000010c0)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0107000000000000000020"], 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x4000172, 0xffffffffffffffff, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="0107000000000000000020000000040003"], 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) 6m7.349302627s ago: executing program 3 (id=990): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kmem_cache_free\x00', r1}, 0x10) symlinkat(0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000003000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000000000000090f0dfc2266e2d8aac930a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x38, 0x2, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x38}}, 0x0) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r3, @ANYBLOB="24002d800800020003"], 0x40}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x2c, 0x3, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="5c00000014006b030231a6080c000af32c00000000f800250502000f00e5aa000017d34460bc24eab556bd05251e6182949a2756f475ce36c2d13b48df000000000000ecb8f6ec63c9f4d4938037e786a6d1bdd700e6657594f1817d", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r6 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r6, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback, 0xfffffffc}, 0x1c) listen(r6, 0x20000005) r7 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x6, @empty}, 0x1c) r8 = accept4(r6, 0x0, 0x0, 0x800) r9 = socket$key(0xf, 0x3, 0x2) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) sendmsg$key(r9, &(0x7f0000000140)={0x9, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg$inet6(r8, &(0x7f00000001c0)=[{{0x0, 0x9b4c, 0x0}}], 0x500, 0x0) close(r7) 6m4.679503086s ago: executing program 3 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x76, 0x141201) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f0000000880)) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) 5m19.27495529s ago: executing program 34 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0842b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6ea1893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66a99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca20508011132153c528f7bca92980a3223c5b9cdddedb0a14adddf9a6e70a26b5c0ee0879c349814bee9d96d8bd23db4e801d49201ae84090455682794098afa42b34196b1d849020eeeb1ef48d003d71524683d7cdfa841bca708414fb8ff49742420d1ab7fa678aa4806d5247616e8bc0b02887f8efe9310ccf9bec1c9b7f6671c9d59ac6b09b4436cafdd1887c8e884c930d21ace088ccc99a94d4b33da2fc1b1310bb607a9ad65844655de1ac9fd36d12e07a821fb951368a970c58fb4f3f403fdaf68902874"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x76, 0x141201) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, &(0x7f0000000880)) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) 4m16.211199254s ago: executing program 4 (id=1205): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r2}, 0x18) 4m15.051130468s ago: executing program 4 (id=1206): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x2, 0x0, @loopback, 0xfffffffc}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000400)=@gcm_128={{0x303, 0x38}, "be00", "00000c70423a000000000000ffff00", "ec69d337", "df02000000000ece"}, 0x28) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) 4m13.9677371s ago: executing program 4 (id=1207): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x9135}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000004800)=@newtaction={0x894, 0x30, 0x12f, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffffd, 0x7f2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x207fff]}, @TCA_POLICE_AVRATE={0x8}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0xfffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa369, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5f5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7e2, 0x0, 0x0, 0xd5, 0xa, 0x96e4, 0x0, 0x0, 0xa, 0x0, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x10001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x80, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffd, 0xfff, 0x0, 0x0, 0x0, 0x1ff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x3, 0x4, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff}, {0xd, 0x2, 0x0, 0x80, 0x0, 0x2}, 0x2}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x890) 4m13.800602335s ago: executing program 4 (id=1208): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f00000002c0)={0x0, 0x5, &(0x7f0000001200)={&(0x7f0000001080)={0x38, 0x1403, 0x1, 0x700, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'syzkaller0\x00'}}]}, 0x38}}, 0x0) 4m13.059860527s ago: executing program 4 (id=1209): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000940), 0x2000, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 4m12.780462945s ago: executing program 4 (id=1210): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x1, 0x0, 0x7ffc0401}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000000), 0x10, &(0x7f0000000200)={&(0x7f0000002180)=ANY=[], 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) close_range(r2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000040180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 3m27.37022796s ago: executing program 35 (id=1210): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x1, 0x0, 0x7ffc0401}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000000), 0x10, &(0x7f0000000200)={&(0x7f0000002180)=ANY=[], 0x48}}, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0'}, 0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) close_range(r2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x280000b, 0x28011, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000040180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 2m32.476074873s ago: executing program 2 (id=1415): ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000104a5270b7357000000925e4a44", @ANYRES32, @ANYBLOB="0dfa130016000000240012000c00010000000000000000000c0002f60800000001180000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000010000507000000000000000000000002", @ANYRES32=r1], 0x48}}, 0x0) 2m32.042370897s ago: executing program 2 (id=1416): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=@newqdisc={0x5c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x4, 0xe}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x2c, 0x2, {{}, [@TCA_NETEM_CORR={0x10, 0x1, {0xc4c5, 0x1, 0x5}}]}}}]}, 0x5c}}, 0x0) 2m31.760438895s ago: executing program 2 (id=1417): setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 2m31.382212536s ago: executing program 2 (id=1418): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x88700a, 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0xb) 2m31.165804812s ago: executing program 2 (id=1419): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000009, 0x4008032, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0xee01) 2m30.915080279s ago: executing program 2 (id=1420): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J]\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)={{0x0, r1, 0x0, 0xee01, 0x0, 0x2, 0x4}, 0x800, 0xc, 0x0, 0x0, 0x0, 0x0, 0x3}) 1m4.131649421s ago: executing program 5 (id=1464): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="640000000206010800000000000000000000000014000780080012400003000008"], 0x64}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) 1m3.390699623s ago: executing program 5 (id=1465): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000400)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 1m2.433355431s ago: executing program 5 (id=1466): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000280)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x7fc00101}]}) socket(0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000300)={r2}) 59.465700969s ago: executing program 5 (id=1467): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000401000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000106608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 10.599427758s ago: executing program 37 (id=1467): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000401000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000106608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1.875631415s ago: executing program 6 (id=1527): msgsnd(0x0, &(0x7f0000001540)=ANY=[], 0x2000, 0x0) 1.690060921s ago: executing program 6 (id=1528): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x38, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) 1.073447809s ago: executing program 6 (id=1529): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000003900)={0x2, 0x4e24, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)="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", 0xfffffffffffffdb0, 0x4040004, 0x0, 0xfffffffb) 800.191037ms ago: executing program 6 (id=1530): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') getdents64(r1, &(0x7f00000000c0)=""/44, 0x2c) 326.57114ms ago: executing program 6 (id=1531): r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x0, 0x1}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) landlock_restrict_self(r0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 0s ago: executing program 6 (id=1532): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)={0x38, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "4ff5677c1a"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}]}, 0x38}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r4, 0x8b2a, &(0x7f0000000040)) kernel console output (not intermixed with test programs): =1400 audit(631.571:1358): avc: denied { relabelto } for pid=6943 comm="syz.2.757" name="" dev="pipefs" ino=8525 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:" [ 376.353542][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 377.381470][ T31] audit: type=1326 audit(633.291:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.2.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 377.383968][ T31] audit: type=1326 audit(633.291:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.2.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 377.384960][ T31] audit: type=1326 audit(633.291:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.2.763" exe="/syz-executor" sig=0 arch=40000028 syscall=448 compat=0 ip=0x133470 code=0x7ffc0000 [ 377.385749][ T31] audit: type=1326 audit(633.291:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.2.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 380.962939][ T6533] veth0_vlan: entered promiscuous mode [ 381.006179][ T6533] veth1_vlan: entered promiscuous mode [ 381.007328][ T31] audit: type=1326 audit(636.921:1363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.2.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 381.013129][ T31] audit: type=1326 audit(636.931:1364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.2.767" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x133470 code=0x7ffc0000 [ 381.024200][ T31] audit: type=1326 audit(636.931:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.2.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 381.025221][ T31] audit: type=1326 audit(636.941:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6999 comm="syz.2.767" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 381.288016][ T6533] veth0_macvtap: entered promiscuous mode [ 381.329985][ T6533] veth1_macvtap: entered promiscuous mode [ 381.466814][ T6533] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.467392][ T6533] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.467766][ T6533] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.468287][ T6533] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 384.582984][ T7019] netlink: 52 bytes leftover after parsing attributes in process `syz.2.775'. [ 386.901982][ T31] audit: type=1400 audit(642.821:1367): avc: denied { read } for pid=7026 comm="syz.2.778" path="socket:[8681]" dev="sockfs" ino=8681 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 389.706132][ T31] audit: type=1326 audit(645.621:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.713863][ T31] audit: type=1326 audit(645.621:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.716142][ T31] audit: type=1326 audit(645.631:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.718844][ T31] audit: type=1326 audit(645.631:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.727064][ T31] audit: type=1326 audit(645.641:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.835927][ T31] audit: type=1326 audit(645.751:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.836938][ T31] audit: type=1326 audit(645.751:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.841589][ T31] audit: type=1326 audit(645.751:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x133470 code=0x7ffc0000 [ 389.842508][ T31] audit: type=1326 audit(645.751:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.2.781" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 390.344446][ T7042] syz.2.785[7042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.344813][ T7042] syz.2.785[7042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.345512][ T7042] syz.2.785[7042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.336081][ T7050] random: crng reseeded on system resumption [ 391.449083][ T7052] netlink: 'syz.2.789': attribute type 1 has an invalid length. [ 391.449761][ T7052] netlink: 'syz.2.789': attribute type 2 has an invalid length. [ 392.551534][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 392.551633][ T31] audit: type=1326 audit(648.461:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.552508][ T31] audit: type=1326 audit(648.461:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.560154][ T31] audit: type=1326 audit(648.461:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.563474][ T31] audit: type=1326 audit(648.481:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.564855][ T31] audit: type=1326 audit(648.481:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.568919][ T31] audit: type=1326 audit(648.481:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.574813][ T31] audit: type=1326 audit(648.491:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.577153][ T31] audit: type=1326 audit(648.491:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.577837][ T31] audit: type=1326 audit(648.491:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 392.581585][ T31] audit: type=1326 audit(648.501:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7065 comm="syz.3.796" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 393.957019][ T7083] syz.3.804[7083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.957495][ T7083] syz.3.804[7083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.958496][ T7083] syz.3.804[7083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.602799][ T7092] netlink: 28 bytes leftover after parsing attributes in process `syz.2.807'. [ 398.892989][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 398.893142][ T31] audit: type=1400 audit(654.811:1435): avc: granted { setsecparam } for pid=7123 comm="syz.2.823" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 399.370137][ T31] audit: type=1326 audit(655.281:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.381585][ T31] audit: type=1326 audit(655.291:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.385761][ T31] audit: type=1326 audit(655.301:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.388867][ T31] audit: type=1326 audit(655.301:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.391718][ T31] audit: type=1326 audit(655.301:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.396263][ T31] audit: type=1326 audit(655.311:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.399542][ T31] audit: type=1326 audit(655.311:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.413886][ T31] audit: type=1326 audit(655.331:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.419028][ T31] audit: type=1326 audit(655.331:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7129 comm="syz.2.826" exe="/syz-executor" sig=0 arch=40000028 syscall=171 compat=0 ip=0x133470 code=0x7ffc0000 [ 399.629322][ T7132] ======================================================= [ 399.629322][ T7132] WARNING: The mand mount option has been deprecated and [ 399.629322][ T7132] and is ignored by this kernel. Remove the mand [ 399.629322][ T7132] option from the mount to silence this warning. [ 399.629322][ T7132] ======================================================= [ 400.410892][ C0] hrtimer: interrupt took 8615216 ns [ 408.893670][ T7163] netlink: 'syz.2.837': attribute type 7 has an invalid length. [ 412.354992][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 412.356657][ T31] audit: type=1326 audit(668.261:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7172 comm="syz.2.841" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 412.380487][ T31] audit: type=1326 audit(668.291:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7172 comm="syz.2.841" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 412.382464][ T31] audit: type=1326 audit(668.291:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7172 comm="syz.2.841" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x133470 code=0x7ffc0000 [ 412.383216][ T31] audit: type=1326 audit(668.291:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7172 comm="syz.2.841" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 412.391406][ T31] audit: type=1326 audit(668.291:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7172 comm="syz.2.841" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 412.713222][ T7175] netlink: 4 bytes leftover after parsing attributes in process `syz.2.842'. [ 413.318182][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 415.195037][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 416.373808][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 416.475217][ T31] audit: type=1326 audit(672.391:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.3.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 416.478223][ T31] audit: type=1326 audit(672.391:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.3.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 416.491991][ T31] audit: type=1326 audit(672.391:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.3.855" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x133470 code=0x7ffc0000 [ 416.493131][ T31] audit: type=1326 audit(672.411:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.3.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 416.494532][ T31] audit: type=1326 audit(672.411:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.3.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.055041][ T7209] syz.2.858 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 417.467937][ T31] audit: type=1326 audit(673.381:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.469366][ T31] audit: type=1326 audit(673.381:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.470183][ T31] audit: type=1326 audit(673.381:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.472070][ T31] audit: type=1326 audit(673.381:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.499412][ T31] audit: type=1326 audit(673.411:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.501252][ T31] audit: type=1326 audit(673.411:1463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.524576][ T31] audit: type=1326 audit(673.421:1464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.526578][ T31] audit: type=1326 audit(673.441:1465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.528302][ T31] audit: type=1326 audit(673.441:1466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.528996][ T31] audit: type=1326 audit(673.441:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7212 comm="syz.3.860" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 417.718174][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 418.628882][ T7223] bond1: entered promiscuous mode [ 418.629405][ T7223] bond1: entered allmulticast mode [ 418.640574][ T7223] 8021q: adding VLAN 0 to HW filter on device bond1 [ 418.658897][ T7223] bond1 (unregistering): Released all slaves [ 422.541096][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 422.541157][ T31] audit: type=1326 audit(678.451:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.542663][ T31] audit: type=1326 audit(678.461:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.556513][ T31] audit: type=1326 audit(678.461:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.557211][ T31] audit: type=1326 audit(678.471:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.557635][ T31] audit: type=1326 audit(678.471:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=230 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.558070][ T31] audit: type=1326 audit(678.471:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.577765][ T31] audit: type=1326 audit(678.491:1494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7310 comm="syz.3.874" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.751461][ T7318] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 422.768059][ T31] audit: type=1326 audit(678.681:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7317 comm="syz.2.878" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.782096][ T31] audit: type=1326 audit(678.691:1496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7317 comm="syz.2.878" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x133470 code=0x7ffc0000 [ 422.783797][ T31] audit: type=1326 audit(678.691:1497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7317 comm="syz.2.878" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 424.443171][ T7334] netdevsim netdevsim2: Direct firmware load for Õ- failed with error -2 [ 424.443749][ T7334] netdevsim netdevsim2: Falling back to sysfs fallback for: Õ- [ 426.552212][ T7345] tmpfs: Unsupported parameter 'mpol' [ 430.581263][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 430.581339][ T31] audit: type=1326 audit(686.491:1521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.601503][ T31] audit: type=1326 audit(686.501:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.603342][ T31] audit: type=1326 audit(686.521:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.611116][ T31] audit: type=1326 audit(686.521:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.612227][ T31] audit: type=1326 audit(686.531:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.613689][ T31] audit: type=1326 audit(686.531:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.626770][ T31] audit: type=1326 audit(686.541:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.627411][ T31] audit: type=1326 audit(686.541:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.628362][ T31] audit: type=1326 audit(686.541:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.640084][ T31] audit: type=1326 audit(686.551:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.3.896" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 430.991678][ T7388] IPv6: NLM_F_CREATE should be specified when creating new route [ 438.788122][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 438.788222][ T31] audit: type=1326 audit(694.701:1545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.798192][ T31] audit: type=1326 audit(694.711:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.823423][ T31] audit: type=1326 audit(694.741:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.834841][ T31] audit: type=1326 audit(694.751:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.842786][ T31] audit: type=1326 audit(694.761:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.847044][ T31] audit: type=1326 audit(694.761:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.848937][ T31] audit: type=1326 audit(694.761:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.861833][ T31] audit: type=1326 audit(694.781:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.862695][ T31] audit: type=1326 audit(694.781:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 438.863273][ T31] audit: type=1326 audit(694.781:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7423 comm="syz.3.912" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 444.782127][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 444.782232][ T31] audit: type=1326 audit(700.681:1591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7479 comm="syz.2.935" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 444.783351][ T31] audit: type=1326 audit(700.691:1592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7479 comm="syz.2.935" exe="/syz-executor" sig=0 arch=40000028 syscall=325 compat=0 ip=0x133470 code=0x7ffc0000 [ 444.787618][ T31] audit: type=1326 audit(700.701:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7479 comm="syz.2.935" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 444.788518][ T31] audit: type=1326 audit(700.701:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7479 comm="syz.2.935" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 445.285241][ T7490] random: crng reseeded on system resumption [ 447.153225][ T31] audit: type=1400 audit(703.061:1595): avc: denied { shutdown } for pid=7512 comm="syz.3.947" lport=42942 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 448.298619][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 449.112297][ T31] audit: type=1326 audit(705.031:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7533 comm="syz.3.954" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 449.113293][ T31] audit: type=1326 audit(705.031:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7533 comm="syz.3.954" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 449.130472][ T31] audit: type=1326 audit(705.041:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7533 comm="syz.3.954" exe="/syz-executor" sig=0 arch=40000028 syscall=302 compat=0 ip=0x133470 code=0x7ffc0000 [ 449.143760][ T31] audit: type=1326 audit(705.041:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7533 comm="syz.3.954" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 449.144467][ T31] audit: type=1326 audit(705.061:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7533 comm="syz.3.954" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 470.418786][ T31] audit: type=1400 audit(726.331:1601): avc: denied { create } for pid=7575 comm="syz.2.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 470.435934][ T31] audit: type=1400 audit(726.351:1602): avc: denied { sys_admin } for pid=7575 comm="syz.2.962" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 470.652158][ T7576] netlink: 72 bytes leftover after parsing attributes in process `syz.2.962'. [ 471.580433][ T7624] netlink: 12 bytes leftover after parsing attributes in process `syz.2.964'. [ 472.417962][ T31] audit: type=1326 audit(728.331:1603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.419540][ T31] audit: type=1326 audit(728.331:1604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.431264][ T31] audit: type=1326 audit(728.331:1605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.432151][ T31] audit: type=1326 audit(728.331:1606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.434003][ T31] audit: type=1326 audit(728.331:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.435046][ T31] audit: type=1326 audit(728.331:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.435969][ T31] audit: type=1326 audit(728.331:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7626 comm="syz.2.965" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 472.733053][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 476.943931][ T31] audit: type=1326 audit(732.791:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.945101][ T31] audit: type=1326 audit(732.861:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.962963][ T31] audit: type=1326 audit(732.871:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.967822][ T31] audit: type=1326 audit(732.881:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.981444][ T31] audit: type=1326 audit(732.891:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.984107][ T31] audit: type=1326 audit(732.891:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 476.999944][ T31] audit: type=1326 audit(732.911:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 477.001952][ T31] audit: type=1326 audit(732.911:1617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 477.002665][ T31] audit: type=1326 audit(732.911:1618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 477.007948][ T31] audit: type=1326 audit(732.921:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7640 comm="syz.3.972" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x133470 code=0x7ffc0000 [ 482.514039][ T7661] netlink: 12 bytes leftover after parsing attributes in process `syz.2.981'. [ 484.894675][ T7682] syz.3.989[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.895033][ T7682] syz.3.989[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.895793][ T7682] syz.3.989[7682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.092761][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 485.092864][ T31] audit: type=1400 audit(741.011:1628): avc: denied { load_policy } for pid=7681 comm="syz.3.989" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 485.102994][ T7682] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 485.104363][ T7682] SELinux: failed to load policy [ 486.984848][ T31] audit: type=1400 audit(742.901:1629): avc: denied { write } for pid=7684 comm="syz.3.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 486.985680][ T31] audit: type=1400 audit(742.901:1630): avc: denied { nlmsg_read } for pid=7684 comm="syz.3.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 491.535045][ T31] audit: type=1400 audit(747.451:1631): avc: denied { create } for pid=7711 comm="syz.2.998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 491.562531][ T31] audit: type=1400 audit(747.471:1632): avc: denied { write } for pid=7711 comm="syz.2.998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 492.527340][ T31] audit: type=1326 audit(748.441:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.529616][ T31] audit: type=1326 audit(748.441:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.545673][ T31] audit: type=1326 audit(748.461:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.546430][ T31] audit: type=1326 audit(748.461:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.561148][ T31] audit: type=1326 audit(748.461:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.567315][ T31] audit: type=1326 audit(748.481:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.597890][ T31] audit: type=1326 audit(748.521:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 492.625170][ T31] audit: type=1326 audit(748.541:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7715 comm="syz.2.1000" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 497.043963][ T7735] IPv6: NLM_F_CREATE should be specified when creating new route [ 508.720023][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 508.731316][ T31] audit: type=1326 audit(764.631:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.732831][ T31] audit: type=1326 audit(764.641:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.737548][ T31] audit: type=1326 audit(764.641:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.754228][ T31] audit: type=1326 audit(764.641:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.766261][ T31] audit: type=1326 audit(764.681:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.783898][ T31] audit: type=1326 audit(764.691:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.801272][ T31] audit: type=1326 audit(764.701:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.810193][ T31] audit: type=1326 audit(764.721:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.812405][ T31] audit: type=1326 audit(764.741:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 508.821170][ T31] audit: type=1326 audit(764.741:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7772 comm="syz.2.1019" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 509.124618][ T7775] SELinux: Context system_u:object_r:depmod_exec_t:s0 is not valid (left unmapped). [ 510.571406][ T7782] netlink: 'syz.2.1022': attribute type 1 has an invalid length. [ 514.549016][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 514.549119][ T31] audit: type=1326 audit(770.461:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7799 comm="syz.2.1029" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 514.566569][ T31] audit: type=1326 audit(770.481:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7799 comm="syz.2.1029" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 514.572570][ T31] audit: type=1326 audit(770.491:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7799 comm="syz.2.1029" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x133470 code=0x7ffc0000 [ 514.574283][ T31] audit: type=1326 audit(770.491:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7799 comm="syz.2.1029" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 515.063547][ T31] audit: type=1400 audit(770.981:1671): avc: denied { setopt } for pid=7801 comm="syz.2.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 515.119598][ T7802] netlink: 'syz.2.1030': attribute type 10 has an invalid length. [ 516.343456][ T31] audit: type=1326 audit(772.261:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.2.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 516.345011][ T31] audit: type=1326 audit(772.261:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.2.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 516.346048][ T31] audit: type=1326 audit(772.261:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.2.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x133470 code=0x7ffc0000 [ 516.351192][ T31] audit: type=1326 audit(772.261:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.2.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 516.352285][ T31] audit: type=1326 audit(772.261:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.2.1032" exe="/syz-executor" sig=0 arch=40000028 syscall=141 compat=0 ip=0x133470 code=0x7ffc0000 [ 529.948092][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 529.948680][ T31] audit: type=1400 audit(785.851:1704): avc: denied { connect } for pid=7822 comm="syz.2.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 532.348225][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 532.348937][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 532.509094][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 532.509751][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 532.704372][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 532.704960][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 532.872087][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 532.872726][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 533.532843][ T11] hsr_slave_0: left promiscuous mode [ 533.585260][ T11] hsr_slave_1: left promiscuous mode [ 533.613064][ T11] veth1_macvtap: left promiscuous mode [ 533.613563][ T11] veth0_macvtap: left promiscuous mode [ 533.613893][ T11] veth1_vlan: left promiscuous mode [ 533.614135][ T7852] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1045'. [ 533.614170][ T11] veth0_vlan: left promiscuous mode [ 536.034977][ T31] audit: type=1326 audit(791.951:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.048298][ T31] audit: type=1326 audit(791.961:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.049452][ T31] audit: type=1326 audit(791.961:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.050375][ T31] audit: type=1326 audit(791.961:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.063879][ T31] audit: type=1326 audit(791.981:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.064778][ T31] audit: type=1326 audit(791.981:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.065659][ T31] audit: type=1326 audit(791.981:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.069809][ T31] audit: type=1326 audit(791.981:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.071112][ T31] audit: type=1326 audit(791.981:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 536.084512][ T31] audit: type=1326 audit(791.991:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7869 comm="syz.2.1050" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 539.952586][ T7853] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 539.958029][ T7853] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 542.531870][ T7853] hsr_slave_0: entered promiscuous mode [ 542.543031][ T7853] hsr_slave_1: entered promiscuous mode [ 543.463800][ T7853] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 543.486445][ T7853] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 543.542901][ T7853] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 543.573142][ T7853] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 545.753163][ T7853] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.466927][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 546.467033][ T31] audit: type=1326 audit(802.381:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.470521][ T31] audit: type=1326 audit(802.381:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.490308][ T31] audit: type=1326 audit(802.401:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.501902][ T31] audit: type=1326 audit(802.421:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.504121][ T31] audit: type=1326 audit(802.421:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.505189][ T31] audit: type=1326 audit(802.421:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.531770][ T31] audit: type=1326 audit(802.441:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.536020][ T31] audit: type=1326 audit(802.441:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 546.537026][ T31] audit: type=1326 audit(802.451:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8235 comm="syz.2.1064" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 550.955709][ T8275] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1072'. [ 551.193210][ T8275] bond1: entered promiscuous mode [ 551.193678][ T8275] bond1: entered allmulticast mode [ 551.224005][ T8275] 8021q: adding VLAN 0 to HW filter on device bond1 [ 555.586394][ T7853] veth0_vlan: entered promiscuous mode [ 555.627688][ T7853] veth1_vlan: entered promiscuous mode [ 555.916915][ T7853] veth0_macvtap: entered promiscuous mode [ 555.939253][ T7853] veth1_macvtap: entered promiscuous mode [ 556.059909][ T7853] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.060534][ T7853] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.068146][ T7853] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.068702][ T7853] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 556.873794][ T31] audit: type=1326 audit(812.771:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8340 comm="syz.4.1075" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 556.874703][ T31] audit: type=1326 audit(812.791:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8340 comm="syz.4.1075" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x133470 code=0x7ffc0000 [ 556.875563][ T31] audit: type=1326 audit(812.791:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8340 comm="syz.4.1075" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 556.876500][ T31] audit: type=1326 audit(812.791:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8340 comm="syz.4.1075" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=0 ip=0x133470 code=0x7ffc0000 [ 556.877333][ T31] audit: type=1326 audit(812.791:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8340 comm="syz.4.1075" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 558.444015][ T31] audit: type=1326 audit(814.361:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8355 comm="syz.4.1079" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 558.446249][ T31] audit: type=1326 audit(814.361:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8355 comm="syz.4.1079" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x133470 code=0x7ffc0000 [ 558.448122][ T31] audit: type=1326 audit(814.361:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8355 comm="syz.4.1079" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 558.449460][ T31] audit: type=1326 audit(814.361:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8355 comm="syz.4.1079" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 558.451311][ T31] audit: type=1326 audit(814.361:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8355 comm="syz.4.1079" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.945886][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 563.945983][ T31] audit: type=1326 audit(819.861:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.949407][ T31] audit: type=1326 audit(819.861:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.951553][ T31] audit: type=1326 audit(819.871:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.955281][ T31] audit: type=1326 audit(819.871:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.956826][ T31] audit: type=1326 audit(819.871:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.963752][ T31] audit: type=1326 audit(819.881:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.972632][ T31] audit: type=1326 audit(819.891:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.974883][ T31] audit: type=1326 audit(819.891:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.977269][ T31] audit: type=1326 audit(819.891:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 563.977969][ T31] audit: type=1326 audit(819.891:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8387 comm="syz.4.1087" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 565.582045][ T8403] netlink: 256 bytes leftover after parsing attributes in process `syz.4.1092'. [ 568.584956][ T8424] block device autoloading is deprecated and will be removed. [ 568.586431][ T8424] syz.4.1102: attempt to access beyond end of device [ 568.586431][ T8424] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 568.711982][ T8428] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1103'. [ 569.562407][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 569.562507][ T31] audit: type=1400 audit(825.481:1879): avc: denied { write } for pid=8432 comm="syz.4.1105" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 569.796023][ T31] audit: type=1400 audit(825.711:1880): avc: denied { open } for pid=8434 comm="syz.4.1106" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 569.798280][ T31] audit: type=1400 audit(825.711:1881): avc: denied { ioctl } for pid=8434 comm="syz.4.1106" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 569.835487][ T31] audit: type=1400 audit(825.751:1882): avc: denied { block_suspend } for pid=8434 comm="syz.4.1106" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 570.211079][ T31] audit: type=1400 audit(826.121:1883): avc: denied { create } for pid=8444 comm="syz.4.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 570.275888][ T31] audit: type=1400 audit(826.191:1884): avc: denied { setopt } for pid=8444 comm="syz.4.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 570.279976][ T31] audit: type=1400 audit(826.191:1885): avc: denied { write } for pid=8444 comm="syz.4.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 570.281553][ T31] audit: type=1400 audit(826.191:1886): avc: denied { connect } for pid=8444 comm="syz.4.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 570.282292][ T31] audit: type=1400 audit(826.191:1887): avc: denied { name_connect } for pid=8444 comm="syz.4.1107" dest=32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 571.111516][ T31] audit: type=1400 audit(826.981:1888): avc: denied { create } for pid=8450 comm="syz.4.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 574.608035][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 574.608136][ T31] audit: type=1400 audit(830.521:1922): avc: denied { write } for pid=8472 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 574.632413][ T31] audit: type=1400 audit(830.551:1923): avc: denied { add_name } for pid=8472 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 574.641366][ T31] audit: type=1400 audit(830.551:1924): avc: denied { create } for pid=8472 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 574.642452][ T31] audit: type=1400 audit(830.551:1925): avc: denied { write open } for pid=8472 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 574.643272][ T31] audit: type=1400 audit(830.551:1926): avc: denied { append } for pid=8472 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=49 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 574.667151][ T31] audit: type=1400 audit(830.581:1927): avc: denied { getattr } for pid=8472 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 574.741136][ T31] audit: type=1400 audit(830.651:1928): avc: denied { read } for pid=8479 comm="syz.4.1123" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 574.742230][ T31] audit: type=1400 audit(830.651:1929): avc: denied { open } for pid=8479 comm="syz.4.1123" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 575.041383][ T31] audit: type=1400 audit(830.941:1930): avc: denied { create } for pid=8486 comm="syz.4.1126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 575.053383][ T31] audit: type=1400 audit(830.961:1931): avc: denied { ioctl } for pid=8486 comm="syz.4.1126" path="socket:[12289]" dev="sockfs" ino=12289 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 575.228035][ T8485] netlink: 'syz.2.1125': attribute type 10 has an invalid length. [ 575.266386][ T8485] netlink: 'syz.2.1125': attribute type 10 has an invalid length. [ 575.267805][ T8485] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1125'. [ 575.268788][ T8485] nlmon0: entered promiscuous mode [ 579.743950][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 579.744030][ T31] audit: type=1326 audit(835.661:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8526 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 579.761148][ T31] audit: type=1326 audit(835.661:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8526 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 579.765296][ T31] audit: type=1326 audit(835.681:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8526 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x133470 code=0x7ffc0000 [ 579.766166][ T31] audit: type=1326 audit(835.681:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8526 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 579.766930][ T31] audit: type=1326 audit(835.681:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8526 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 580.336524][ T31] audit: type=1326 audit(836.251:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8552 comm="syz.2.1142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 580.339636][ T31] audit: type=1326 audit(836.251:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8552 comm="syz.2.1142" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 580.340421][ T31] audit: type=1326 audit(836.251:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8552 comm="syz.2.1142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 580.347513][ T31] audit: type=1326 audit(836.251:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8552 comm="syz.2.1142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 580.349369][ T31] audit: type=1326 audit(836.271:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8552 comm="syz.2.1142" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 581.508880][ T8560] syz.2.1145[8560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.509180][ T8560] syz.2.1145[8560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.509801][ T8560] syz.2.1145[8560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.887033][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 584.887134][ T31] audit: type=1326 audit(840.801:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.898351][ T31] audit: type=1326 audit(840.811:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.903863][ T31] audit: type=1326 audit(840.821:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.904711][ T31] audit: type=1326 audit(840.821:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.905853][ T31] audit: type=1326 audit(840.821:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.910486][ T31] audit: type=1326 audit(840.821:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.924759][ T31] audit: type=1326 audit(840.841:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.925811][ T31] audit: type=1326 audit(840.841:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.927443][ T31] audit: type=1326 audit(840.841:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 584.931466][ T31] audit: type=1326 audit(840.841:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8592 comm="syz.4.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 585.177623][ T8596] netlink: 'syz.2.1156': attribute type 10 has an invalid length. [ 585.204428][ T8596] nlmon0: left promiscuous mode [ 585.629108][ T8601] bond2: entered promiscuous mode [ 585.637016][ T8601] bond2: entered allmulticast mode [ 585.665381][ T8601] 8021q: adding VLAN 0 to HW filter on device bond2 [ 585.687461][ T8601] bond2 (unregistering): Released all slaves [ 586.471899][ T8678] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 590.054566][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 590.054768][ T31] audit: type=1400 audit(845.971:2002): avc: denied { ioctl } for pid=8719 comm="syz.2.1181" path="socket:[12489]" dev="sockfs" ino=12489 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 591.199672][ T8742] IPv6: Can't replace route, no match found [ 591.419933][ T31] audit: type=1400 audit(847.331:2003): avc: denied { create } for pid=8747 comm="syz.4.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 591.423975][ T31] audit: type=1400 audit(847.341:2004): avc: denied { write } for pid=8747 comm="syz.4.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 591.583164][ T31] audit: type=1400 audit(847.491:2005): avc: denied { create } for pid=8751 comm="syz.4.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 592.003850][ T31] audit: type=1326 audit(847.891:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 592.008068][ T31] audit: type=1326 audit(847.891:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 592.008770][ T31] audit: type=1326 audit(847.891:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 592.052962][ T31] audit: type=1326 audit(847.951:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 592.063341][ T31] audit: type=1326 audit(847.951:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 592.081335][ T31] audit: type=1326 audit(847.951:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8756 comm="syz.2.1194" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 595.071505][ T31] kauditd_printk_skb: 1564 callbacks suppressed [ 595.071615][ T31] audit: type=1326 audit(850.961:3576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.073254][ T31] audit: type=1326 audit(850.991:3577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.074489][ T31] audit: type=1326 audit(850.991:3578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.075799][ T31] audit: type=1326 audit(850.991:3579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.076607][ T31] audit: type=1326 audit(850.991:3580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.077386][ T31] audit: type=1326 audit(850.991:3581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.078143][ T31] audit: type=1326 audit(850.991:3582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.078868][ T31] audit: type=1326 audit(850.991:3583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.079722][ T31] audit: type=1326 audit(850.991:3584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 595.081191][ T31] audit: type=1326 audit(850.991:3585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 596.770524][ T8791] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 596.943330][ T8791] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 597.164412][ T8791] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 597.266712][ T8791] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 597.516492][ T8791] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.551339][ T8791] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.560303][ T8791] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.609780][ T8791] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 600.082236][ T31] kauditd_printk_skb: 3071 callbacks suppressed [ 600.082312][ T31] audit: type=1326 audit(856.001:6657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.084166][ T31] audit: type=1326 audit(856.001:6658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.089531][ T31] audit: type=1326 audit(856.001:6659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.093132][ T31] audit: type=1326 audit(856.011:6660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.094480][ T31] audit: type=1326 audit(856.011:6661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.095769][ T31] audit: type=1326 audit(856.011:6662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.111267][ T31] audit: type=1326 audit(856.021:6663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.112543][ T31] audit: type=1326 audit(856.021:6664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.121260][ T31] audit: type=1326 audit(856.021:6665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 600.122275][ T31] audit: type=1326 audit(856.021:6666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8784 comm="syz.2.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ff00000 [ 606.382494][ T31] kauditd_printk_skb: 4476 callbacks suppressed [ 606.382613][ T31] audit: type=1400 audit(862.301:11143): avc: denied { create } for pid=8838 comm="syz.2.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 606.461425][ T31] audit: type=1400 audit(862.351:11144): avc: denied { setopt } for pid=8838 comm="syz.2.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 607.507051][ T31] audit: type=1326 audit(863.421:11145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8843 comm="syz.2.1215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 607.509134][ T31] audit: type=1326 audit(863.421:11146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8843 comm="syz.2.1215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 607.525890][ T31] audit: type=1326 audit(863.431:11147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8843 comm="syz.2.1215" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x133470 code=0x7ffc0000 [ 607.548732][ T31] audit: type=1326 audit(863.451:11148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8843 comm="syz.2.1215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 607.582027][ T31] audit: type=1326 audit(863.491:11149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8843 comm="syz.2.1215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 609.243308][ T8853] syz.2.1218[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 609.243657][ T8853] syz.2.1218[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 609.244534][ T8853] syz.2.1218[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.321332][ T31] audit: type=1326 audit(869.231:11150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.353577][ T31] audit: type=1326 audit(869.261:11151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.360090][ T31] audit: type=1326 audit(869.261:11152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.377688][ T31] audit: type=1326 audit(869.291:11153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.403302][ T31] audit: type=1326 audit(869.321:11154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.409967][ T31] audit: type=1326 audit(869.321:11155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.417657][ T31] audit: type=1326 audit(869.321:11156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.422417][ T31] audit: type=1326 audit(869.341:11157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.431382][ T31] audit: type=1326 audit(869.341:11158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 613.432883][ T31] audit: type=1326 audit(869.341:11159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8872 comm="syz.2.1225" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 615.876812][ T8885] bond2: entered promiscuous mode [ 615.877350][ T8885] bond2: entered allmulticast mode [ 615.878287][ T8885] 8021q: adding VLAN 0 to HW filter on device bond2 [ 615.974185][ T8885] bond2 (unregistering): Released all slaves [ 622.664655][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 622.664745][ T31] audit: type=1400 audit(878.541:11163): avc: denied { ioctl } for pid=8979 comm="syz.2.1239" path="socket:[13583]" dev="sockfs" ino=13583 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.297685][ T31] audit: type=1400 audit(879.211:11164): avc: denied { sys_module } for pid=8979 comm="syz.2.1239" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 628.927920][ T9007] netlink: 'syz.2.1248': attribute type 4 has an invalid length. [ 629.033237][ T9007] netlink: 'syz.2.1248': attribute type 4 has an invalid length. [ 630.694042][ T31] audit: type=1400 audit(886.611:11165): avc: denied { read write } for pid=5722 comm="syz-executor" name="loop2" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 630.695085][ T31] audit: type=1400 audit(886.611:11166): avc: denied { open } for pid=5722 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=773 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 630.695863][ T31] audit: type=1400 audit(886.611:11167): avc: denied { ioctl } for pid=5722 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=773 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 630.871108][ T31] audit: type=1400 audit(886.781:11168): avc: denied { read } for pid=9012 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 630.876833][ T31] audit: type=1400 audit(886.791:11169): avc: denied { prog_load } for pid=9012 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 630.877702][ T31] audit: type=1400 audit(886.791:11170): avc: denied { bpf } for pid=9012 comm="syz.2.1251" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 630.878107][ T31] audit: type=1400 audit(886.791:11171): avc: denied { perfmon } for pid=9012 comm="syz.2.1251" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 630.879728][ T31] audit: type=1400 audit(886.791:11172): avc: denied { prog_run } for pid=9012 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 630.913301][ T31] audit: type=1400 audit(886.831:11173): avc: denied { load_policy } for pid=9012 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 630.923478][ T9013] SELinux: failed to load policy [ 631.397243][ T31] audit: type=1400 audit(887.311:11174): avc: denied { create } for pid=9015 comm="syz.2.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 632.459605][ T9023] netlink: 56 bytes leftover after parsing attributes in process `syz.2.1254'. [ 632.934922][ T9025] netlink: 'syz.2.1255': attribute type 10 has an invalid length. [ 632.944132][ T9025] netlink: 'syz.2.1255': attribute type 10 has an invalid length. [ 635.743298][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 635.743385][ T31] audit: type=1326 audit(891.661:11204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.764152][ T31] audit: type=1326 audit(891.681:11205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.767989][ T31] audit: type=1326 audit(891.681:11206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.769490][ T31] audit: type=1326 audit(891.681:11207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.775241][ T31] audit: type=1326 audit(891.691:11208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.790278][ T31] audit: type=1326 audit(891.691:11209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 635.799363][ T31] audit: type=1326 audit(891.691:11210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9036 comm="syz.2.1259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 636.271642][ T31] audit: type=1400 audit(892.161:11211): avc: denied { create } for pid=9040 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 636.290025][ T31] audit: type=1400 audit(892.191:11212): avc: denied { ioctl } for pid=9040 comm="syz.2.1260" path="socket:[12945]" dev="sockfs" ino=12945 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 636.299860][ T31] audit: type=1400 audit(892.221:11213): avc: denied { bind } for pid=9040 comm="syz.2.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 640.864100][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 640.864203][ T31] audit: type=1400 audit(896.781:11223): avc: denied { read } for pid=9057 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 640.889653][ T31] audit: type=1326 audit(896.801:11224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.897892][ T31] audit: type=1326 audit(896.811:11225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.907612][ T31] audit: type=1326 audit(896.821:11226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.908740][ T31] audit: type=1400 audit(896.821:11227): avc: denied { map_create } for pid=9057 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.909654][ T31] audit: type=1400 audit(896.821:11228): avc: denied { map_read map_write } for pid=9057 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.910309][ T31] audit: type=1326 audit(896.821:11229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.921434][ T31] audit: type=1326 audit(896.821:11230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.922329][ T31] audit: type=1326 audit(896.831:11231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9057 comm="syz.2.1266" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 640.923081][ T31] audit: type=1400 audit(896.831:11232): avc: denied { prog_load } for pid=9057 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 645.883312][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 645.883415][ T31] audit: type=1400 audit(901.801:11257): avc: denied { create } for pid=9082 comm="syz.2.1272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 646.022916][ T31] audit: type=1400 audit(901.941:11258): avc: denied { sys_module } for pid=9081 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 646.074739][ T31] audit: type=1400 audit(901.991:11259): avc: denied { mounton } for pid=9086 comm="syz.2.1273" path="/464/file0" dev="tmpfs" ino=2380 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 646.076023][ T31] audit: type=1400 audit(901.991:11260): avc: denied { mount } for pid=9086 comm="syz.2.1273" name="/" dev="ramfs" ino=13693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 646.152406][ T31] audit: type=1326 audit(902.051:11261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 646.153525][ T31] audit: type=1326 audit(902.071:11262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 646.159026][ T31] audit: type=1326 audit(902.071:11263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=177 compat=0 ip=0x133470 code=0x7ffc0000 [ 646.160402][ T31] audit: type=1326 audit(902.071:11264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 646.164887][ T31] audit: type=1326 audit(902.071:11265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 646.165856][ T31] audit: type=1326 audit(902.091:11266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9086 comm="syz.2.1273" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x133470 code=0x7ffc0000 [ 651.104648][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 651.104772][ T31] audit: type=1400 audit(907.021:11295): avc: denied { create } for pid=9232 comm="syz.2.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 651.783049][ T9081] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 651.788405][ T9081] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 654.438652][ T9081] hsr_slave_0: entered promiscuous mode [ 654.453166][ T9081] hsr_slave_1: entered promiscuous mode [ 654.455862][ T9081] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 654.456291][ T9081] Cannot create hsr debugfs directory [ 654.881894][ T31] audit: type=1400 audit(1166.802:11296): avc: denied { create } for pid=9369 comm="syz.2.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 654.893338][ T31] audit: type=1400 audit(1166.812:11297): avc: denied { write } for pid=9369 comm="syz.2.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 654.894587][ T31] audit: type=1400 audit(1166.812:11298): avc: denied { read } for pid=9369 comm="syz.2.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 655.800060][ T9081] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 655.842158][ T9081] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 655.849071][ T9081] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 655.868879][ T9081] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 655.899166][ T31] audit: type=1400 audit(1167.812:11299): avc: denied { create } for pid=9426 comm="syz.2.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 655.917391][ T31] audit: type=1400 audit(1167.832:11300): avc: denied { connect } for pid=9426 comm="syz.2.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 655.920392][ T31] audit: type=1400 audit(1167.832:11301): avc: denied { write } for pid=9426 comm="syz.2.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 656.523133][ T31] audit: type=1400 audit(1168.442:11302): avc: denied { create } for pid=9437 comm="syz.2.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 656.559097][ T31] audit: type=1400 audit(1168.472:11303): avc: denied { bind } for pid=9437 comm="syz.2.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 656.561940][ T9438] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 656.568062][ T31] audit: type=1400 audit(1168.482:11304): avc: denied { write } for pid=9437 comm="syz.2.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 656.826513][ T31] audit: type=1400 audit(1168.742:11305): avc: denied { create } for pid=9440 comm="syz.2.1289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 656.827556][ T31] audit: type=1400 audit(1168.742:11306): avc: denied { write } for pid=9440 comm="syz.2.1289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 657.052425][ T31] audit: type=1326 audit(1168.952:11307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9443 comm="syz.2.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 657.053288][ T31] audit: type=1326 audit(1168.972:11308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9443 comm="syz.2.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 657.066527][ T31] audit: type=1326 audit(1168.982:11309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9443 comm="syz.2.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=325 compat=0 ip=0x133470 code=0x7ffc0000 [ 657.067795][ T31] audit: type=1326 audit(1168.982:11310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9443 comm="syz.2.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 657.068645][ T31] audit: type=1326 audit(1168.982:11311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9443 comm="syz.2.1290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 657.829329][ T9081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 659.221267][ T9475] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1296'. [ 659.319274][ T9081] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 661.295812][ T9502] tc_dump_action: action bad kind [ 662.303273][ T9519] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1309'. [ 664.106199][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 664.106285][ T31] audit: type=1400 audit(1176.022:11329): avc: denied { map } for pid=9541 comm="syz.2.1315" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 664.110578][ T31] audit: type=1400 audit(1176.022:11330): avc: denied { read write } for pid=9541 comm="syz.2.1315" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13884 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 664.146499][ T31] audit: type=1400 audit(1176.062:11331): avc: denied { create } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.156356][ T31] audit: type=1400 audit(1176.072:11332): avc: denied { bind } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.157336][ T31] audit: type=1400 audit(1176.072:11333): avc: denied { listen } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.158312][ T31] audit: type=1400 audit(1176.072:11334): avc: denied { connect } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.159290][ T31] audit: type=1400 audit(1176.072:11335): avc: denied { accept } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 664.177929][ T31] audit: type=1400 audit(1176.092:11336): avc: denied { read } for pid=9541 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 667.754177][ T9081] veth0_vlan: entered promiscuous mode [ 667.775506][ T9081] veth1_vlan: entered promiscuous mode [ 667.985893][ T9081] veth0_macvtap: entered promiscuous mode [ 668.005485][ T9081] veth1_macvtap: entered promiscuous mode [ 668.139637][ T9081] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.140140][ T9081] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.140641][ T9081] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.152757][ T9081] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.271105][ T31] audit: type=1400 audit(1180.182:11337): avc: denied { mounton } for pid=9081 comm="syz-executor" path="/syzkaller.YyOWfa/syz-tmp" dev="vda" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 668.271893][ T31] audit: type=1400 audit(1180.182:11338): avc: denied { mount } for pid=9081 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 668.556731][ T9570] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 668.557453][ T9570] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 668.558008][ T9570] netdevsim netdevsim2: Falling back to sysfs fallback for: . [ 669.154238][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 669.154525][ T31] audit: type=1326 audit(1181.072:11348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9574 comm="syz.5.1323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 669.167455][ T31] audit: type=1326 audit(1181.082:11349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9574 comm="syz.5.1323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 669.183065][ T31] audit: type=1326 audit(1181.092:11350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9574 comm="syz.5.1323" exe="/syz-executor" sig=0 arch=40000028 syscall=372 compat=0 ip=0x133470 code=0x7ffc0000 [ 669.192813][ T31] audit: type=1326 audit(1181.092:11351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9574 comm="syz.5.1323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 672.118787][ T31] audit: type=1400 audit(1183.796:11352): avc: denied { create } for pid=9595 comm="syz.2.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 673.600542][ T31] audit: type=1400 audit(1185.171:11353): avc: denied { append } for pid=9618 comm="syz.2.1341" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 675.240880][ T9634] netlink: 3648 bytes leftover after parsing attributes in process `syz.2.1346'. [ 675.245823][ T9634] netlink: 3648 bytes leftover after parsing attributes in process `syz.2.1346'. [ 676.308977][ T31] audit: type=1326 audit(1187.671:11354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.321449][ T31] audit: type=1326 audit(1187.690:11355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.330628][ T31] audit: type=1326 audit(1187.699:11356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.332139][ T31] audit: type=1326 audit(1187.699:11357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.347161][ T31] audit: type=1326 audit(1187.717:11358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.350909][ T31] audit: type=1326 audit(1187.717:11359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.352413][ T31] audit: type=1326 audit(1187.717:11360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.354801][ T31] audit: type=1326 audit(1187.717:11361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.378841][ T31] audit: type=1326 audit(1187.745:11362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 676.380532][ T31] audit: type=1326 audit(1187.745:11363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9642 comm="syz.2.1350" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 682.690503][ T9708] syz.5.1373[9708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.691436][ T9708] syz.5.1373[9708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.692598][ T9708] syz.5.1373[9708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.715828][ T9708] geneve0: entered allmulticast mode [ 683.440898][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 683.440988][ T31] audit: type=1326 audit(1194.232:11397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.442123][ T31] audit: type=1326 audit(1194.259:11398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.478313][ T31] audit: type=1326 audit(1194.296:11399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.479701][ T31] audit: type=1326 audit(1194.296:11400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.481212][ T31] audit: type=1326 audit(1194.296:11401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.498490][ T31] audit: type=1326 audit(1194.305:11402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.523652][ T31] audit: type=1326 audit(1194.315:11403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.530782][ T31] audit: type=1326 audit(1194.333:11404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.564413][ T31] audit: type=1326 audit(1194.361:11405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 683.567696][ T31] audit: type=1326 audit(1194.379:11406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9716 comm="syz.2.1376" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 689.389830][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 689.389888][ T31] audit: type=1400 audit(1199.749:11429): avc: denied { write } for pid=9784 comm="syz.5.1394" name="net" dev="proc" ino=14244 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 689.390757][ T31] audit: type=1400 audit(1199.749:11430): avc: denied { add_name } for pid=9784 comm="syz.5.1394" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 689.391325][ T31] audit: type=1400 audit(1199.749:11431): avc: denied { create } for pid=9784 comm="syz.5.1394" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 689.391927][ T31] audit: type=1400 audit(1199.749:11432): avc: denied { associate } for pid=9784 comm="syz.5.1394" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 689.392548][ T31] audit: type=1400 audit(1199.749:11433): avc: denied { write } for pid=9784 comm="syz.5.1394" name="pfkey" dev="proc" ino=4026533202 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 695.952902][ T31] audit: type=1400 audit(1205.802:11434): avc: denied { setcheckreqprot } for pid=9834 comm="syz.2.1403" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 696.151135][ T9837] pimreg: entered allmulticast mode [ 696.170195][ T9837] pimreg: left allmulticast mode [ 697.484204][ T31] audit: type=1326 audit(1207.214:11435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.492750][ T31] audit: type=1326 audit(1207.223:11436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.494438][ T31] audit: type=1326 audit(1207.223:11437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.501113][ T31] audit: type=1326 audit(1207.223:11438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.502202][ T31] audit: type=1326 audit(1207.223:11439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.503008][ T31] audit: type=1326 audit(1207.223:11440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.513103][ T31] audit: type=1326 audit(1207.232:11441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.522787][ T31] audit: type=1326 audit(1207.242:11442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 697.523751][ T31] audit: type=1326 audit(1207.242:11443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.1408" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 700.396100][ T9872] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1415'. [ 701.486767][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 701.486870][ T31] audit: type=1400 audit(1210.905:11479): avc: denied { unmount } for pid=9879 comm="syz.2.1418" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 722.554081][ T9887] syz.5.1421[9887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.554447][ T9887] syz.5.1421[9887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.555229][ T9887] syz.5.1421[9887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.117485][ T9913] netlink: 20 bytes leftover after parsing attributes in process `syz.5.1432'. [ 732.515052][ T31] audit: type=1326 audit(1239.536:11480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.551067][ T31] audit: type=1326 audit(1239.536:11481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.582644][ T31] audit: type=1326 audit(1239.582:11482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.595104][ T31] audit: type=1326 audit(1239.592:11483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.596030][ T31] audit: type=1326 audit(1239.592:11484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.597079][ T31] audit: type=1326 audit(1239.619:11485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.598733][ T31] audit: type=1326 audit(1239.619:11486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.600999][ T31] audit: type=1326 audit(1239.619:11487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.602181][ T31] audit: type=1326 audit(1239.619:11488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 732.603488][ T31] audit: type=1326 audit(1239.619:11489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9914 comm="syz.5.1433" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.312191][ T3029] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 773.431010][ T9917] netlink: 'syz.5.1434': attribute type 10 has an invalid length. [ 773.441160][ T9918] netlink: 'syz.5.1434': attribute type 10 has an invalid length. [ 773.441701][ T9918] netlink: 2 bytes leftover after parsing attributes in process `syz.5.1434'. [ 773.442295][ T9918] nlmon0: entered promiscuous mode [ 773.760512][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 773.760615][ T31] audit: type=1326 audit(1277.598:11493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.761763][ T31] audit: type=1326 audit(1277.598:11494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.767942][ T31] audit: type=1326 audit(1277.607:11495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.768972][ T31] audit: type=1326 audit(1277.607:11496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.778341][ T31] audit: type=1326 audit(1277.607:11497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.781392][ T31] audit: type=1326 audit(1277.616:11498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.783237][ T31] audit: type=1326 audit(1277.616:11499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.787949][ T31] audit: type=1326 audit(1277.616:11500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.789678][ T31] audit: type=1326 audit(1277.616:11501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x133470 code=0x7ffc0000 [ 773.790515][ T31] audit: type=1326 audit(1277.616:11502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9923 comm="syz.5.1435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 775.721283][T10006] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1443'. [ 779.198174][ T9882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 779.262560][ T9882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 780.250004][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 780.250094][ T31] audit: type=1400 audit(1283.586:11529): avc: denied { setopt } for pid=10132 comm="syz.5.1450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 780.567402][T10142] tmpfs: Bad value for 'nr_inodes' [ 782.196428][ T9882] hsr_slave_0: entered promiscuous mode [ 782.209619][ T9882] hsr_slave_1: entered promiscuous mode [ 782.219420][ T9882] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 782.219680][ T9882] Cannot create hsr debugfs directory [ 783.485477][T10240] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 783.853600][ T9882] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 783.884385][ T9882] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 783.944924][ T9882] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 783.952131][ T9882] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 784.018590][ T31] audit: type=1400 audit(1287.055:11530): avc: denied { mount } for pid=10274 comm="syz.5.1458" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 784.098421][ T31] audit: type=1326 audit(1287.138:11531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.106604][ T31] audit: type=1326 audit(1287.147:11532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.143185][ T31] audit: type=1326 audit(1287.157:11533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.166895][ T31] audit: type=1326 audit(1287.194:11534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.183377][ T31] audit: type=1326 audit(1287.203:11535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.190592][ T31] audit: type=1326 audit(1287.203:11536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.203079][ T31] audit: type=1326 audit(1287.203:11537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 784.204810][ T31] audit: type=1326 audit(1287.203:11538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10276 comm="syz.5.1459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 786.419861][ T9882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 788.522393][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 788.522497][ T31] audit: type=1400 audit(1291.217:11548): avc: denied { getopt } for pid=10298 comm="syz.5.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 788.821970][ T31] audit: type=1400 audit(1291.484:11549): avc: denied { ioctl } for pid=10300 comm="syz.5.1464" path="socket:[15784]" dev="sockfs" ino=15784 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 790.017647][ T31] audit: type=1400 audit(1292.591:11550): avc: denied { ioctl } for pid=10307 comm="syz.5.1465" path="socket:[15788]" dev="sockfs" ino=15788 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 791.082364][ T31] audit: type=1326 audit(1293.579:11551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10316 comm="syz.5.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7fc00000 [ 793.184229][ T31] audit: type=1326 audit(1295.516:11552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10316 comm="syz.5.1466" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133470 code=0x7fc00000 [ 801.860921][ T9882] veth0_vlan: entered promiscuous mode [ 801.883741][ T9882] veth1_vlan: entered promiscuous mode [ 802.304444][ T9882] veth0_macvtap: entered promiscuous mode [ 802.387343][ T9882] veth1_macvtap: entered promiscuous mode [ 802.834825][ T9882] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.835531][ T9882] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.835900][ T9882] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.838124][ T9882] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 803.965577][ T31] audit: type=1400 audit(1305.454:11553): avc: denied { lock } for pid=10342 comm="syz.6.1424" path="socket:[15883]" dev="sockfs" ino=15883 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 804.393996][ T31] audit: type=1400 audit(1305.851:11554): avc: denied { getopt } for pid=10344 comm="syz.6.1468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 806.048460][T10354] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 806.052509][T10354] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 808.323246][ T31] audit: type=1400 audit(1309.486:11555): avc: denied { bind } for pid=10360 comm="syz.6.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 808.335103][ T31] audit: type=1400 audit(1309.486:11556): avc: denied { name_bind } for pid=10360 comm="syz.6.1473" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 808.336813][ T31] audit: type=1400 audit(1309.495:11557): avc: denied { node_bind } for pid=10360 comm="syz.6.1473" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 808.739095][T10363] veth0_vlan: entered allmulticast mode [ 809.292777][ T31] audit: type=1400 audit(1310.363:11558): avc: denied { setopt } for pid=10364 comm="syz.6.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 811.633204][ T31] audit: type=1326 audit(1312.531:11559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.634632][ T31] audit: type=1326 audit(1312.549:11560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.636297][ T31] audit: type=1326 audit(1312.549:11561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.638583][ T31] audit: type=1326 audit(1312.549:11562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.640786][ T31] audit: type=1326 audit(1312.549:11563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.655854][ T31] audit: type=1326 audit(1312.568:11564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.659556][ T31] audit: type=1326 audit(1312.568:11565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.682265][ T31] audit: type=1326 audit(1312.586:11566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.693690][ T31] audit: type=1326 audit(1312.596:11567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133470 code=0x7ffc0000 [ 811.704222][ T31] audit: type=1326 audit(1312.596:11568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10373 comm="syz.6.1479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133470 code=0x7ffc0000 [ 819.059023][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 819.059119][ T31] audit: type=1400 audit(1319.396:11604): avc: denied { ioctl } for pid=10398 comm="syz.6.1486" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15996 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 819.357836][ T31] audit: type=1400 audit(1319.663:11605): avc: denied { accept } for pid=10400 comm="syz.6.1487" laddr=::1 lport=37276 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 820.262089][ T31] audit: type=1400 audit(1320.494:11606): avc: denied { sqpoll } for pid=10404 comm="syz.6.1489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 830.437178][ T31] audit: type=1400 audit(1329.887:11607): avc: denied { read } for pid=10423 comm="syz.6.1496" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 843.572381][ T31] audit: type=1400 audit(1341.993:11608): avc: denied { execute } for pid=10452 comm="syz.6.1505" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1040 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 844.299345][T10462] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1508'. [ 847.040281][ T31] audit: type=1400 audit(1345.204:11609): avc: denied { nlmsg_read } for pid=10553 comm="syz.6.1516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 847.041157][T10562] netlink: 104 bytes leftover after parsing attributes in process `syz.6.1516'. [ 848.216029][T10607] ip_vti0: entered promiscuous mode [ 848.216933][T10607] vlan2: entered promiscuous mode [ 848.233818][T10607] ip_vti0: left promiscuous mode [ 849.320712][ T31] audit: type=1400 audit(1347.308:11610): avc: denied { bind } for pid=10619 comm="syz.6.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 849.350852][ T31] audit: type=1400 audit(1347.344:11611): avc: denied { setopt } for pid=10619 comm="syz.6.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 849.611231][T10444] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 849.626434][T10444] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 850.180772][T10677] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 850.194971][T10677] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 850.736113][ T31] audit: type=1400 audit(1348.609:11612): avc: denied { create } for pid=10685 comm="syz.6.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 852.619482][T10444] hsr_slave_0: entered promiscuous mode [ 852.625417][T10444] hsr_slave_1: entered promiscuous mode [ 852.632864][T10444] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 852.633160][T10444] Cannot create hsr debugfs directory [ 853.175337][ T32] INFO: task kworker/1:6:3804 blocked for more than 430 seconds. [ 853.176384][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.177899][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.178574][ T32] task:kworker/1:6 state:D stack:0 pid:3804 tgid:3804 ppid:2 flags:0x00000000 [ 853.179371][ T32] Workqueue: events bpf_prog_free_deferred [ 853.180740][ T32] Call trace: [ 853.181279][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.181988][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dfe75da4 r5:83eaa400 [ 853.182385][ T32] r4:83eaa400 [ 853.182638][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.183051][ T32] r5:83eaa400 r4:82717b6c [ 853.183260][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.183705][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.203231][ T31] audit: type=1400 audit(1350.897:11613): avc: denied { write } for pid=3079 comm="syz-executor" path="pipe:[466]" dev="pipefs" ino=466 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 853.217853][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe75e20 [ 853.218338][ T32] r4:00000000 [ 853.218527][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.219025][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.219459][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.219862][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fbfe80 [ 853.220188][ T32] r4:00000000 [ 853.220417][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.220804][ T32] r9:83eaa400 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f029000 [ 853.221244][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.221674][ T32] r5:00001000 r4:dfaff000 [ 853.221869][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.222241][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.222647][ T32] r5:83da3f54 r4:83da3c00 [ 853.222840][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.223261][ T32] r7:ddde40c0 r6:82c18200 r5:83da3f54 r4:84b1f580 [ 853.223578][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.223966][ T32] r10:83eaa400 r9:84b1f5ac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 853.224299][ T32] r4:84b1f580 [ 853.224491][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.224866][ T32] r10:00000000 r9:e04d5e78 r8:84b3b740 r7:84b1f580 r6:80266ad4 r5:83eaa400 [ 853.225165][ T32] r4:84b4f3c0 [ 853.225339][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.225813][ T32] Exception stack(0xdfe75fb0 to 0xdfe75ff8) [ 853.226289][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 853.226809][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.227254][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.261110][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:84b4f3c0 [ 853.261760][ T32] INFO: task kworker/0:6:3830 blocked for more than 430 seconds. [ 853.262101][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.262398][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.262693][ T32] task:kworker/0:6 state:D stack:0 pid:3830 tgid:3830 ppid:2 flags:0x00000000 [ 853.263114][ T32] Workqueue: events bpf_prog_free_deferred [ 853.263439][ T32] Call trace: [ 853.263644][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.263999][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0009da4 r5:84a1e000 [ 853.264339][ T32] r4:84a1e000 [ 853.264525][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 853.283315][ T32] r5:84a1e000 r4:82717b6c [ 853.283736][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.284219][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.284751][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0009e20 [ 853.285059][ T32] r4:00000000 [ 853.285223][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.285630][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.286094][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.286537][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ea740 [ 853.286837][ T32] r4:00000000 [ 853.287014][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.287426][ T32] r9:84a1e000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f00b000 [ 853.287774][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.288192][ T32] r5:00001000 r4:dfa01000 [ 853.288514][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.288882][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.289284][ T32] r5:8481cf54 r4:8481cc00 [ 853.289461][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.289872][ T32] r7:dddd00c0 r6:82c18000 r5:8481cf54 r4:84b57580 [ 853.290118][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.290571][ T32] r10:84a1e000 r9:84b575ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.290959][ T32] r4:84b57580 [ 853.291207][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.291605][ T32] r10:00000000 r9:dfd79e78 r8:84b05000 r7:84b57580 r6:80266ad4 r5:84a1e000 [ 853.291959][ T32] r4:84beaec0 [ 853.292145][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.315415][ T32] Exception stack(0xe0009fb0 to 0xe0009ff8) [ 853.315861][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 853.316224][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.316649][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.316997][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:84beaec0 [ 853.327623][ T32] INFO: task kworker/0:147:4932 blocked for more than 430 seconds. [ 853.328808][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.329457][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.329791][ T32] task:kworker/0:147 state:D stack:0 pid:4932 tgid:4932 ppid:2 flags:0x00000000 [ 853.330286][ T32] Workqueue: events bpf_prog_free_deferred [ 853.330639][ T32] Call trace: [ 853.330831][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.331246][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0015da4 r5:84dc3c00 [ 853.331589][ T32] r4:84dc3c00 [ 853.331848][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.332227][ T32] r5:84dc3c00 r4:82717b6c [ 853.332560][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.333097][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.333484][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e20 [ 853.333774][ T32] r4:00000000 [ 853.333982][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.334401][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.334914][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.335342][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842ba580 [ 853.335648][ T32] r4:00000000 [ 853.336311][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.359341][ T32] r9:84dc3c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f02d000 [ 853.359672][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.360092][ T32] r5:00001000 r4:dfc3f000 [ 853.360349][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.360747][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.361129][ T32] r5:84cf7b54 r4:84cf7800 [ 853.361323][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.361790][ T32] r7:dddd00c0 r6:82c18000 r5:84cf7b54 r4:84f72780 [ 853.362452][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.362899][ T32] r10:84dc3c00 r9:84f727ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.363200][ T32] r4:84f72780 [ 853.363438][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.363798][ T32] r10:00000000 r9:dfc2de78 r8:851c0ac0 r7:84f72780 r6:80266ad4 r5:84dc3c00 [ 853.364173][ T32] r4:851c0d40 [ 853.364624][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.365096][ T32] Exception stack(0xe0015fb0 to 0xe0015ff8) [ 853.365385][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 853.365683][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.366288][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.366579][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:851c0d40 [ 853.366885][ T32] INFO: task kworker/0:152:4969 blocked for more than 430 seconds. [ 853.367257][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.367629][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.368043][ T32] task:kworker/0:152 state:D stack:0 pid:4969 tgid:4969 ppid:2 flags:0x00000000 [ 853.370556][ T31] audit: type=1400 audit(1350.998:11614): avc: denied { read } for pid=2898 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 853.371410][ T31] audit: type=1400 audit(1351.044:11615): avc: denied { search } for pid=2898 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 853.372156][ T31] audit: type=1400 audit(1351.044:11616): avc: denied { append } for pid=2898 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 853.372976][ T31] audit: type=1400 audit(1351.044:11617): avc: denied { open } for pid=2898 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 853.373852][ T31] audit: type=1400 audit(1351.044:11618): avc: denied { getattr } for pid=2898 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 853.391545][ T32] Workqueue: events bpf_prog_free_deferred [ 853.393383][ T32] Call trace: [ 853.393583][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.393915][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0191da4 r5:84013c00 [ 853.394316][ T32] r4:84013c00 [ 853.394528][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.395008][ T32] r5:84013c00 r4:82717b6c [ 853.395237][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.395741][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.396189][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0191e20 [ 853.396578][ T32] r4:00000000 [ 853.396765][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.397177][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.397680][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.399548][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d9da80 [ 853.399889][ T32] r4:00000000 [ 853.400081][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.400551][ T32] r9:84013c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f00d000 [ 853.400936][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.424119][ T32] r5:00001000 r4:dfa27000 [ 853.425637][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.429534][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.430018][ T32] r5:8481cb54 r4:8481c800 [ 853.430238][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.430689][ T32] r7:dddd00c0 r6:82c18000 r5:8481cb54 r4:84f72e00 [ 853.430983][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.431520][ T32] r10:84013c00 r9:84f72e2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.431906][ T32] r4:84f72e00 [ 853.432092][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.432557][ T32] r10:00000000 r9:e0015e78 r8:850dfe80 r7:84f72e00 r6:80266ad4 r5:84013c00 [ 853.432968][ T32] r4:84d4d540 [ 853.433161][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.433873][ T32] Exception stack(0xe0191fb0 to 0xe0191ff8) [ 853.447790][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 853.451402][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.451923][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.452488][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:84d4d540 [ 853.453645][ T32] INFO: task kworker/0:153:4974 blocked for more than 430 seconds. [ 853.454052][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.454337][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.454726][ T32] task:kworker/0:153 state:D stack:0 pid:4974 tgid:4974 ppid:2 flags:0x00000000 [ 853.457542][ T32] Workqueue: events bpf_prog_free_deferred [ 853.457919][ T32] Call trace: [ 853.458141][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.467302][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e06d5da4 r5:84016c00 [ 853.468988][ T32] r4:84016c00 [ 853.470160][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.473100][ T32] r5:84016c00 r4:82717b6c [ 853.474449][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.476594][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.477231][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e20 [ 853.491360][ T32] r4:00000000 [ 853.492592][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.494562][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.494934][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.495408][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ecd00 [ 853.495786][ T32] r4:00000000 [ 853.496010][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.498098][ T32] r9:84016c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f059000 [ 853.510120][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.510663][ T32] r5:00001000 r4:e057b000 [ 853.510948][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.511434][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.511858][ T32] r5:8521ab54 r4:8521a800 [ 853.512094][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.512516][ T32] r7:dddd00c0 r6:82c18000 r5:8521ab54 r4:84f72f80 [ 853.512754][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.513186][ T32] r10:84016c00 r9:84f72fac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.513568][ T32] r4:84f72f80 [ 853.513768][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.514320][ T32] r10:00000000 r9:e0015e78 r8:850d0840 r7:84f72f80 r6:80266ad4 r5:84016c00 [ 853.514817][ T32] r4:850d0e00 [ 853.515008][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.515359][ T32] Exception stack(0xe06d5fb0 to 0xe06d5ff8) [ 853.515655][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 853.516029][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.516349][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.516644][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:850d0e00 [ 853.517085][ T32] INFO: task kworker/0:154:4975 blocked for more than 430 seconds. [ 853.517565][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.517815][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.518187][ T32] task:kworker/0:154 state:D stack:0 pid:4975 tgid:4975 ppid:2 flags:0x00000000 [ 853.518851][ T32] Workqueue: events bpf_prog_free_deferred [ 853.519238][ T32] Call trace: [ 853.519460][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.520175][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e06f9da4 r5:84011800 [ 853.531806][ T32] r4:84011800 [ 853.532082][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.532575][ T32] r5:84011800 r4:82717b6c [ 853.532784][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.533266][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.533809][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e20 [ 853.534240][ T32] r4:00000000 [ 853.534435][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.534905][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.535452][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.536045][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ebe80 [ 853.536472][ T32] r4:00000000 [ 853.536696][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.537160][ T32] r9:84011800 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2a4000 [ 853.537631][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.538100][ T32] r5:00001000 r4:e0755000 [ 853.538446][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.538903][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.539328][ T32] r5:84914b54 r4:84914800 [ 853.539619][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.540103][ T32] r7:dddd00c0 r6:82c18000 r5:84914b54 r4:84f72580 [ 853.540394][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.540838][ T32] r10:84011800 r9:84f725ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.541225][ T32] r4:84f72580 [ 853.541446][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.553746][ T32] r10:00000000 r9:e06d5e78 r8:84b29040 r7:84f72580 r6:80266ad4 r5:84011800 [ 853.554167][ T32] r4:850d0e00 [ 853.554378][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.554779][ T32] Exception stack(0xe06f9fb0 to 0xe06f9ff8) [ 853.555084][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 853.555465][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.555960][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.556383][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:850d0e00 [ 853.556757][ T32] INFO: task kworker/0:155:4993 blocked for more than 430 seconds. [ 853.557126][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.557417][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.557888][ T32] task:kworker/0:155 state:D stack:0 pid:4993 tgid:4993 ppid:2 flags:0x00000000 [ 853.558425][ T32] Workqueue: events bpf_prog_free_deferred [ 853.558958][ T32] Call trace: [ 853.559174][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.559564][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0695da4 r5:852b6c00 [ 853.559924][ T32] r4:852b6c00 [ 853.560199][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.560725][ T32] r5:852b6c00 r4:82717b6c [ 853.560946][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.561486][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.562122][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e20 [ 853.562983][ T32] r4:00000000 [ 853.563171][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.575279][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.575896][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.576377][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843b9600 [ 853.576803][ T32] r4:00000000 [ 853.577092][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.577564][ T32] r9:852b6c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f05d000 [ 853.577911][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.578347][ T32] r5:00001000 r4:e065d000 [ 853.578581][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.579091][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.579554][ T32] r5:8521bb54 r4:8521b800 [ 853.579775][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.580348][ T32] r7:dddd00c0 r6:82c18000 r5:8521bb54 r4:8545d080 [ 853.580811][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.581531][ T32] r10:852b6c00 r9:8545d0ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.581913][ T32] r4:8545d080 [ 853.582246][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.583151][ T32] r10:00000000 r9:e06d5e78 r8:84fe9e40 r7:8545d080 r6:80266ad4 r5:852b6c00 [ 853.583738][ T32] r4:851c7b80 [ 853.583927][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.584401][ T32] Exception stack(0xe0695fb0 to 0xe0695ff8) [ 853.584843][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 853.597335][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.598017][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.598347][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:851c7b80 [ 853.598994][ T32] INFO: task kworker/0:156:4994 blocked for more than 430 seconds. [ 853.599390][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.599653][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.599973][ T32] task:kworker/0:156 state:D stack:0 pid:4994 tgid:4994 ppid:2 flags:0x00000000 [ 853.600552][ T32] Workqueue: events bpf_prog_free_deferred [ 853.600859][ T32] Call trace: [ 853.601077][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.601489][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dfca5da4 r5:852b5400 [ 853.601828][ T32] r4:852b5400 [ 853.601984][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.604988][ T32] r5:852b5400 r4:82717b6c [ 853.610705][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.611258][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.611750][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e20 [ 853.612171][ T32] r4:00000000 [ 853.612402][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.612932][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.613514][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.614101][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849eb440 [ 853.614499][ T32] r4:00000000 [ 853.614687][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.615137][ T32] r9:852b5400 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f2a2000 [ 853.615529][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.616111][ T32] r5:00001000 r4:e06e5000 [ 853.616436][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.616965][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.617776][ T32] r5:8481c354 r4:8481c000 [ 853.618019][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.629466][ T32] r7:dddd00c0 r6:82c18000 r5:8481c354 r4:8545d200 [ 853.629892][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.630363][ T32] r10:852b5400 r9:8545d22c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.630766][ T32] r4:8545d200 [ 853.630970][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.631437][ T32] r10:00000000 r9:e06d5e78 r8:84fe9fc0 r7:8545d200 r6:80266ad4 r5:852b5400 [ 853.631801][ T32] r4:851c7d00 [ 853.631963][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.632530][ T32] Exception stack(0xdfca5fb0 to 0xdfca5ff8) [ 853.632877][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 853.633301][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.633674][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.634003][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:851c7d00 [ 853.634360][ T32] INFO: task kworker/0:157:5027 blocked for more than 430 seconds. [ 853.634703][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.634952][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.635274][ T32] task:kworker/0:157 state:D stack:0 pid:5027 tgid:5027 ppid:2 flags:0x00000000 [ 853.635774][ T32] Workqueue: events bpf_prog_free_deferred [ 853.636095][ T32] Call trace: [ 853.636515][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.636916][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dffa9da4 r5:83608000 [ 853.637246][ T32] r4:83608000 [ 853.637461][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.644536][ T32] r5:83608000 r4:82717b6c [ 853.648937][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.651484][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.660015][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffa9e20 [ 853.672313][ T32] r4:00000000 [ 853.674189][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.681222][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.695008][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.699285][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843b9d00 [ 853.704966][ T32] r4:00000000 [ 853.714319][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.716540][ T32] r9:83608000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f055000 [ 853.716902][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.717844][ T32] r5:00001000 r4:e04c7000 [ 853.722062][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.728105][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.728695][ T32] r5:8481db54 r4:8481d800 [ 853.728925][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 853.729386][ T32] r7:dddd00c0 r6:82c18000 r5:8481db54 r4:8545d280 [ 853.729666][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 853.735089][ T32] r10:83608000 r9:8545d2ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 853.738227][ T32] r4:8545d280 [ 853.740929][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 853.756198][ T32] r10:00000000 r9:e06d5e78 r8:852f8280 r7:8545d280 r6:80266ad4 r5:83608000 [ 853.764846][ T32] r4:8545b6c0 [ 853.769206][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 853.771127][ T32] Exception stack(0xdffa9fb0 to 0xdffa9ff8) [ 853.771678][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 853.778598][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 853.789823][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 853.792700][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:8545b6c0 [ 853.798171][ T32] INFO: task kworker/0:158:5028 blocked for more than 430 seconds. [ 853.817264][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 853.817919][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 853.821166][ T32] task:kworker/0:158 state:D stack:0 pid:5028 tgid:5028 ppid:2 flags:0x00000000 [ 853.838842][ T32] Workqueue: events bpf_prog_free_deferred [ 853.900565][ T32] Call trace: [ 853.902030][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 853.912713][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:dff49da4 r5:83608c00 [ 853.919019][ T32] r4:83608c00 [ 853.945485][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 853.946101][ T32] r5:83608c00 r4:82717b6c [ 853.946321][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 853.968334][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 853.977834][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff49e20 [ 853.978310][ T32] r4:00000000 [ 853.978510][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 853.978963][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 853.979392][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 853.980535][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85485a80 [ 853.985209][ T32] r4:00000000 [ 853.985448][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 853.985901][ T32] r9:83608c00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f05f000 [ 853.989272][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 853.992000][ T32] r5:00001000 r4:e0671000 [ 853.993518][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 853.996383][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 853.999001][ T32] r5:843f1f54 r4:843f1c00 [ 854.000327][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.003423][ T32] r7:dddd00c0 r6:82c18000 r5:843f1f54 r4:8545d300 [ 854.006073][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.008907][ T32] r10:83608c00 r9:8545d32c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.009185][ T32] r4:8545d300 [ 854.009347][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.010398][ T32] r10:00000000 r9:e06d5e78 r8:852f83c0 r7:8545d300 r6:80266ad4 r5:83608c00 [ 854.012972][ T32] r4:8545b2c0 [ 854.014778][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.017548][ T32] Exception stack(0xdff49fb0 to 0xdff49ff8) [ 854.019742][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 854.022256][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.024782][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.027394][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:8545b2c0 [ 854.029317][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.030684][ T32] INFO: task kworker/0:159:5033 blocked for more than 430 seconds. [ 854.030990][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.031257][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.031596][ T32] task:kworker/0:159 state:D stack:0 pid:5033 tgid:5033 ppid:2 flags:0x00000000 [ 854.032005][ T32] Workqueue: events bpf_prog_free_deferred [ 854.032312][ T32] Call trace: [ 854.032493][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.032878][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0771da4 r5:8360b000 [ 854.033190][ T32] r4:8360b000 [ 854.033352][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.033761][ T32] r5:8360b000 r4:82717b6c [ 854.033958][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.034627][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.034987][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e20 [ 854.035450][ T32] r4:00000000 [ 854.035698][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.036060][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.036519][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.039803][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7600 [ 854.044961][ T32] r4:00000000 [ 854.046391][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.049654][ T32] r9:8360b000 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f05b000 [ 854.052025][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.052460][ T32] r5:00001000 r4:e05e3000 [ 854.052710][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.055238][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.058397][ T32] r5:8481e354 r4:8481e000 [ 854.060711][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.064836][ T32] r7:dddd00c0 r6:82c18000 r5:8481e354 r4:8545d180 [ 854.067943][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.071709][ T32] r10:8360b000 r9:8545d1ac r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.073863][ T32] r4:8545d180 [ 854.074022][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.074401][ T32] r10:00000000 r9:e06d5e78 r8:852f8d00 r7:8545d180 r6:80266ad4 r5:8360b000 [ 854.075762][ T32] r4:8545be40 [ 854.077377][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.080330][ T32] Exception stack(0xe0771fb0 to 0xe0771ff8) [ 854.082569][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 854.084572][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.087295][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.094758][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:8545be40 [ 854.107169][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.107738][ T32] INFO: task kworker/0:160:5035 blocked for more than 430 seconds. [ 854.108276][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.108534][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.108860][ T32] task:kworker/0:160 state:D stack:0 pid:5035 tgid:5035 ppid:2 flags:0x00000000 [ 854.109324][ T32] Workqueue: events bpf_prog_free_deferred [ 854.109778][ T32] Call trace: [ 854.112910][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.116186][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0745da4 r5:8360bc00 [ 854.123242][ T32] r4:8360bc00 [ 854.124585][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.127972][ T32] r5:8360bc00 r4:82717b6c [ 854.128282][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.128853][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.129457][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e20 [ 854.133083][ T32] r4:00000000 [ 854.135249][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.138716][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.140931][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.144065][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e7100 [ 854.147162][ T32] r4:00000000 [ 854.148678][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.151465][ T32] r9:8360bc00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f057000 [ 854.154542][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.157954][ T32] r5:00001000 r4:e053d000 [ 854.159497][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.160904][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.161260][ T32] r5:8521a354 r4:8521a000 [ 854.162427][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.165567][ T32] r7:dddd00c0 r6:82c18000 r5:8521a354 r4:8545d100 [ 854.167265][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.170414][ T32] r10:8360bc00 r9:8545d12c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.172819][ T32] r4:8545d100 [ 854.174270][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.176716][ T32] r10:00000000 r9:e06d5e78 r8:84b58880 r7:8545d100 r6:80266ad4 r5:8360bc00 [ 854.179136][ T32] r4:8545b640 [ 854.180423][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.182280][ T32] Exception stack(0xe0745fb0 to 0xe0745ff8) [ 854.182497][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 854.182852][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.183957][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.186610][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:8545b640 [ 854.188897][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.191313][ T32] INFO: task kworker/0:162:5046 blocked for more than 431 seconds. [ 854.191609][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.192011][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.192397][ T32] task:kworker/0:162 state:D stack:0 pid:5046 tgid:5046 ppid:2 flags:0x00000000 [ 854.194049][ T32] Workqueue: events bpf_prog_free_deferred [ 854.196315][ T32] Call trace: [ 854.197639][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.200381][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e0875da4 r5:8360ec00 [ 854.202260][ T32] r4:8360ec00 [ 854.202991][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.204504][ T32] r5:8360ec00 r4:82717b6c [ 854.204653][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.205015][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.205836][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0875e20 [ 854.208409][ T32] r4:00000000 [ 854.209633][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.212122][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.214585][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.214819][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ea5c0 [ 854.217546][ T32] r4:00000000 [ 854.218556][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.220704][ T32] r9:8360ec00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f053000 [ 854.222301][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.224505][ T32] r5:00001000 r4:e0171000 [ 854.224952][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.226902][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.229515][ T32] r5:8481e754 r4:8481e400 [ 854.230794][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.233187][ T32] r7:dddd00c0 r6:82c18000 r5:8481e754 r4:8545d400 [ 854.235098][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.237162][ T32] r10:8360ec00 r9:8545d42c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.237341][ T32] r4:8545d400 [ 854.237437][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.237631][ T32] r10:00000000 r9:e0835e78 r8:852e9b80 r7:8545d400 r6:80266ad4 r5:8360ec00 [ 854.237779][ T32] r4:852e62c0 [ 854.237856][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.238050][ T32] Exception stack(0xe0875fb0 to 0xe0875ff8) [ 854.238172][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 854.238309][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.238450][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.238572][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:852e62c0 [ 854.238696][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.238839][ T32] INFO: task kworker/0:163:5074 blocked for more than 431 seconds. [ 854.238971][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.239073][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.239196][ T32] task:kworker/0:163 state:D stack:0 pid:5074 tgid:5074 ppid:2 flags:0x00000000 [ 854.239378][ T32] Workqueue: events bpf_prog_free_deferred [ 854.239507][ T32] Call trace: [ 854.239607][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.239786][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:e89ddda4 r5:8524bc00 [ 854.241449][ T32] r4:8524bc00 [ 854.242638][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.245596][ T32] r5:8524bc00 r4:82717b6c [ 854.247041][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.247379][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.248401][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e89dde20 [ 854.250300][ T32] r4:00000000 [ 854.251386][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.253741][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.256118][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.258799][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ebcc0 [ 854.260898][ T32] r4:00000000 [ 854.261960][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.264265][ T32] r9:8524bc00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f051000 [ 854.266179][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.268864][ T32] r5:00001000 r4:e0115000 [ 854.269007][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.269291][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.269671][ T32] r5:8481eb54 r4:8481e800 [ 854.270827][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.273670][ T32] r7:dddd00c0 r6:82c18000 r5:8481eb54 r4:8545d600 [ 854.275423][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.277733][ T32] r10:8524bc00 r9:8545d62c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.279176][ T32] r4:8545d600 [ 854.280511][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.282742][ T32] r10:00000000 r9:e0835e78 r8:852f03c0 r7:8545d600 r6:80266ad4 r5:8524bc00 [ 854.284529][ T32] r4:850d96c0 [ 854.286160][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.288448][ T32] Exception stack(0xe89ddfb0 to 0xe89ddff8) [ 854.289830][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 854.291785][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.293848][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.296059][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:850d96c0 [ 854.297823][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.300467][ T32] INFO: task kworker/0:164:5114 blocked for more than 431 seconds. [ 854.301531][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.301738][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.301965][ T32] task:kworker/0:164 state:D stack:0 pid:5114 tgid:5114 ppid:2 flags:0x00000000 [ 854.302276][ T32] Workqueue: events bpf_prog_free_deferred [ 854.302481][ T32] Call trace: [ 854.302583][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.303616][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:eaa65da4 r5:8541ec00 [ 854.305701][ T32] r4:8541ec00 [ 854.306803][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.309259][ T32] r5:8541ec00 r4:82717b6c [ 854.310570][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.312939][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.315920][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e20 [ 854.317714][ T32] r4:00000000 [ 854.318868][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.320877][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.322989][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.323269][ T32] r10:82c18005 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c0c80 [ 854.323557][ T32] r4:00000000 [ 854.323651][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.323908][ T32] r9:8541ec00 r8:00800000 r7:00000000 r6:82c18000 r5:00001000 r4:7f04f000 [ 854.325249][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.327608][ T32] r5:00001000 r4:e00d3000 [ 854.328849][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.330978][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.333335][ T32] r5:83da2754 r4:83da2400 [ 854.334124][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.336593][ T32] r7:dddd00c0 r6:82c18000 r5:83da2754 r4:8545d800 [ 854.338233][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.339466][ T32] r10:8541ec00 r9:8545d82c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 854.339706][ T32] r4:8545d800 [ 854.339814][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.340091][ T32] r10:00000000 r9:e0835e78 r8:853b3140 r7:8545d800 r6:80266ad4 r5:8541ec00 [ 854.340417][ T32] r4:85024d80 [ 854.340524][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.340766][ T32] Exception stack(0xeaa65fb0 to 0xeaa65ff8) [ 854.341124][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 854.341351][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.341727][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.341903][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:85024d80 [ 854.342139][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.342493][ T32] INFO: task kworker/1:143:5268 blocked for more than 431 seconds. [ 854.342766][ T32] Not tainted 6.12.0-rc6-syzkaller #0 [ 854.351744][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 854.352119][ T32] task:kworker/1:143 state:D stack:0 pid:5268 tgid:5268 ppid:2 flags:0x00000000 [ 854.352558][ T32] Workqueue: events bpf_prog_free_deferred [ 854.353149][ T32] Call trace: [ 854.353413][ T32] [<819bec84>] (__schedule) from [<819bf8dc>] (schedule+0x2c/0xfc) [ 854.354019][ T32] r10:8260ca7c r9:00000000 r8:82717b70 r7:00000002 r6:eaa21da4 r5:84a16c00 [ 854.354274][ T32] r4:84a16c00 [ 854.354812][ T32] [<819bf8b0>] (schedule) from [<819bfc90>] (schedule_preempt_disabled+0x18/0x24) [ 854.356696][ T32] r5:84a16c00 r4:82717b6c [ 854.356890][ T32] [<819bfc78>] (schedule_preempt_disabled) from [<819c2768>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 854.357186][ T32] [<819c2480>] (__mutex_lock.constprop.0) from [<819c3034>] (__mutex_lock_slowpath+0x14/0x18) [ 854.357486][ T32] r10:8260ca7c r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e20 [ 854.357757][ T32] r4:00000000 [ 854.357854][ T32] [<819c3020>] (__mutex_lock_slowpath) from [<819c3074>] (mutex_lock+0x3c/0x40) [ 854.358080][ T32] [<819c3038>] (mutex_lock) from [<804ae3e0>] (_vm_unmap_aliases+0x68/0x240) [ 854.358326][ T32] [<804ae378>] (_vm_unmap_aliases) from [<804b213c>] (vfree+0x170/0x1e4) [ 854.358593][ T32] r10:82c18205 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951f80 [ 854.358803][ T32] r4:00000000 [ 854.358944][ T32] [<804b1fcc>] (vfree) from [<805104f0>] (execmem_free+0x30/0x64) [ 854.359289][ T32] r9:84a16c00 r8:01800000 r7:00000000 r6:82c18200 r5:00001000 r4:7f03f000 [ 854.359830][ T32] [<805104c0>] (execmem_free) from [<8039c664>] (bpf_jit_free_exec+0x10/0x14) [ 854.360191][ T32] r5:00001000 r4:dfd1d000 [ 854.361886][ T32] [<8039c654>] (bpf_jit_free_exec) from [<8039ca44>] (bpf_jit_free+0x68/0xe4) [ 854.364181][ T32] [<8039c9dc>] (bpf_jit_free) from [<8039db98>] (bpf_prog_free_deferred+0x14c/0x164) [ 854.366372][ T32] r5:8481c754 r4:8481c400 [ 854.366530][ T32] [<8039da4c>] (bpf_prog_free_deferred) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.366854][ T32] r7:ddde40c0 r6:82c18200 r5:8481c754 r4:852e1b80 [ 854.367046][ T32] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.367435][ T32] r10:84a16c00 r9:852e1bac r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 854.367658][ T32] r4:852e1b80 [ 854.367756][ T32] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.367999][ T32] r10:00000000 r9:e89ade78 r8:84fbfc80 r7:852e1b80 r6:80266ad4 r5:84a16c00 [ 854.368666][ T32] r4:851c0ec0 [ 854.368787][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.369316][ T32] Exception stack(0xeaa21fb0 to 0xeaa21ff8) [ 854.371161][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 854.373337][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.375565][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.377179][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:851c0ec0 [ 854.377497][ T32] Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [ 854.378419][ T32] NMI backtrace for cpu 1 [ 854.378687][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc6-syzkaller #0 [ 854.378977][ T32] Hardware name: ARM-Versatile Express [ 854.379178][ T32] Call trace: [ 854.379310][ T32] [<8199c7b8>] (dump_backtrace) from [<8199c8b4>] (show_stack+0x18/0x1c) [ 854.379580][ T32] r7:00000000 r6:00000013 r5:60000093 r4:8203db2c [ 854.379792][ T32] [<8199c89c>] (show_stack) from [<819bad6c>] (dump_stack_lvl+0x70/0x7c) [ 854.380154][ T32] [<819bacfc>] (dump_stack_lvl) from [<819bad90>] (dump_stack+0x18/0x1c) [ 854.380564][ T32] r5:00000001 r4:00000001 [ 854.380761][ T32] [<819bad78>] (dump_stack) from [<81989a70>] (nmi_cpu_backtrace+0x160/0x17c) [ 854.381170][ T32] [<81989910>] (nmi_cpu_backtrace) from [<81989bbc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 854.381635][ T32] r7:00000001 r6:8260c5d0 r5:8261af0c r4:ffffffff [ 854.381876][ T32] [<81989a8c>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 854.382175][ T32] r9:0000d2ec r8:828b6cf8 r7:8260c730 r6:00007d3b r5:8261b4c8 r4:85c0941c [ 854.382393][ T32] [<802103d0>] (arch_trigger_cpumask_backtrace) from [<8035831c>] (watchdog+0x498/0x5b8) [ 854.382662][ T32] [<80357e84>] (watchdog) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.383019][ T32] r10:00000000 r9:df819e58 r8:82e9f440 r7:00000000 r6:80357e84 r5:82ee1800 [ 854.383327][ T32] r4:82f459c0 [ 854.383487][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.383813][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 854.384027][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 854.384356][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.384656][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.384945][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:82f459c0 [ 854.385474][ T32] Sending NMI from CPU 1 to CPUs 0: [ 854.386285][ C0] NMI backtrace for cpu 0 [ 854.386544][ C0] CPU: 0 UID: 0 PID: 7251 Comm: kworker/u9:6 Not tainted 6.12.0-rc6-syzkaller #0 [ 854.386638][ C0] Hardware name: ARM-Versatile Express [ 854.386672][ C0] Workqueue: events_power_efficient wg_ratelimiter_gc_entries [ 854.386810][ C0] PC is at in_lock_functions+0x0/0x3c [ 854.386938][ C0] LR is at preempt_count_add+0x114/0x150 [ 854.387023][ C0] pc : [<802ae608>] lr : [<8027d3f4>] psr: 60000113 [ 854.387069][ C0] sp : e08dde70 ip : e08dde98 fp : e08dde94 [ 854.387108][ C0] r10: 00001803 r9 : 80c66914 r8 : 00000000 [ 854.387146][ C0] r7 : 827785c4 r6 : 819c822c r5 : 00000001 r4 : 85460c00 [ 854.387186][ C0] r3 : 00000001 r2 : 00000000 r1 : 00000000 r0 : 819c822c [ 854.387296][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 854.387392][ C0] Control: 30c5387d Table: 84222080 DAC: fffffffd [ 854.387474][ C0] Call trace: [ 854.387522][ C0] [<8027d2e0>] (preempt_count_add) from [<819c822c>] (_raw_spin_lock+0x18/0x58) [ 854.387629][ C0] r6:000000c3 r5:9312bcac r4:829119dc [ 854.387648][ C0] [<819c8214>] (_raw_spin_lock) from [<80c6677c>] (wg_ratelimiter_gc_entries+0xa4/0x23c) [ 854.387742][ C0] r5:9312bcac r4:3b9aca00 [ 854.387755][ C0] [<80c666d8>] (wg_ratelimiter_gc_entries) from [<802660dc>] (process_one_work+0x1b4/0x4f4) [ 854.387852][ C0] r10:82e60015 r9:85460c00 r8:02400000 r7:82c0f600 r6:82e60000 r5:827785c4 [ 854.387868][ C0] r4:84cde780 [ 854.387882][ C0] [<80265f28>] (process_one_work) from [<80266cc0>] (worker_thread+0x1ec/0x3bc) [ 854.387968][ C0] r10:85460c00 r9:84cde7ac r8:61c88647 r7:82c0f620 r6:82604d40 r5:82c0f600 [ 854.387986][ C0] r4:84cde780 [ 854.388000][ C0] [<80266ad4>] (worker_thread) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.388077][ C0] r10:00000000 r9:eaa29e78 r8:856e32c0 r7:84cde780 r6:80266ad4 r5:85460c00 [ 854.388095][ C0] r4:856e3d00 [ 854.388106][ C0] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.388155][ C0] Exception stack(0xe08ddfb0 to 0xe08ddff8) [ 854.388220][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 854.388286][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.388315][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.388350][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:856e3d00 [ 854.391903][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 854.409944][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc6-syzkaller #0 [ 854.410219][ T32] Hardware name: ARM-Versatile Express [ 854.410393][ T32] Call trace: [ 854.410534][ T32] [<8199c7b8>] (dump_backtrace) from [<8199c8b4>] (show_stack+0x18/0x1c) [ 854.410816][ T32] r7:00000000 r6:82622f44 r5:00000000 r4:8203db2c [ 854.411012][ T32] [<8199c89c>] (show_stack) from [<819bad50>] (dump_stack_lvl+0x54/0x7c) [ 854.411280][ T32] [<819bacfc>] (dump_stack_lvl) from [<819bad90>] (dump_stack+0x18/0x1c) [ 854.411533][ T32] r5:00000000 r4:82870d18 [ 854.411664][ T32] [<819bad78>] (dump_stack) from [<8199d3e0>] (panic+0x120/0x374) [ 854.411876][ T32] [<8199d2c0>] (panic) from [<8035819c>] (watchdog+0x318/0x5b8) [ 854.412092][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8203e62c [ 854.412330][ T32] r7:8260c730 [ 854.412442][ T32] [<80357e84>] (watchdog) from [<8026fd3c>] (kthread+0x104/0x134) [ 854.412670][ T32] r10:00000000 r9:df819e58 r8:82e9f440 r7:00000000 r6:80357e84 r5:82ee1800 [ 854.412900][ T32] r4:82f459c0 [ 854.413244][ T32] [<8026fc38>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 854.415915][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 854.417611][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 854.419603][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 854.420468][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 854.420705][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fc38 r4:82f459c0 [ 854.423621][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:22:00 Registers: info registers vcpu 0 CPU#0 R00=00000016 R01=00000000 R02=00000000 R03=82ee1800 R04=df8e1dd0 R05=df8e1dc4 R06=8202f702 R07=8039da4c R08=8202f702 R09=df8e1d34 R10=df8e1dc4 R11=df8e1ccc R12=df8e1980 R13=df8e1a10 R14=803292c8 R15=81993720 PSR=60000193 -ZC- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=e234f997 s05=29e152ef d02=29e152efe234f997 s06=00000000 s07=00000000 d03=0000000000000000 s08=db0d27d0 s09=e10f7ede d04=e10f7ededb0d27d0 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=18174270 s17=2b80f303 d08=2b80f30318174270 s18=16b9266e s19=00000000 d09=0000000016b9266e s20=744456f2 s21=24986689 d10=24986689744456f2 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000200 R01=7ef11288 R02=00000200 R03=00000000 R04=76f29418 R05=7ef11284 R06=00000014 R07=00000003 R08=00000000 R09=76f2c0d0 R10=7ef11288 R11=7ef1112c R12=00000000 R13=eb1f1ff8 R14=76f141b0 R15=76f141b0 PSR=40000093 -Z-- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=fd59464a s05=daf6245d d02=daf6245dfd59464a s06=00000000 s07=00000000 d03=0000000000000000 s08=895cc660 s09=fe0b1916 d04=fe0b1916895cc660 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=e450b6ec s21=10d737b1 d10=10d737b1e450b6ec s22=6a579e6d s23=00000000 d11=000000006a579e6d s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000