rogram 4: setregid(0xee01, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x41800, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@fscache}, {@sq={'sq', 0x3d, 0x8000}}, {@rq}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_lt={'euid<', 0xffffffffffffffff}}]}}) setregid(0xee01, 0x0) (async) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x41800, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@fscache}, {@sq={'sq', 0x3d, 0x8000}}, {@rq}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_lt={'euid<', 0xffffffffffffffff}}]}}) (async) 20:24:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0xbe183) 20:24:35 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() setregid(r0, r1) 20:24:35 executing program 3: set_mempolicy(0x2, 0x0, 0xfffffffffffffbfd) 20:24:35 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) (async) getegid() setregid(r0, r1) 20:24:35 executing program 4: setregid(0xee01, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x41800, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@common=@fscache}, {@sq={'sq', 0x3d, 0x8000}}, {@rq}, {@common=@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}], [{@euid_lt={'euid<', 0xffffffffffffffff}}]}}) 20:24:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0xbe183) 20:24:35 executing program 3: set_mempolicy(0x2, 0x0, 0xfffffffffffffbfd) 20:24:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) 20:24:35 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="332a634d53f0213749b158c9fe0e00f3f904ca3c6685f427bc838a1f81e1dfd928755d56075a206d820e678212cc6ee885a287d985efbc19036a49044931f60052a3d8c772e7c719b683bbe90e1fdb54b1c98d", 0x53, 0x4040000, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setregid(r0, r2) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x10, &(0x7f00000004c0)) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100000, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}, {@cache_fscache}, {@fscache}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@audit}, {@obj_user={'obj_user', 0x3d, '{#'}}, {@measure}, {@euid_lt={'euid<', r1}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) 20:24:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0xbe183) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0xbe183) (async) 20:24:35 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) setregid(r0, 0xee01) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000000c0)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x7, 0xfffffefb}}, './file0\x00'}) 20:24:35 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() setregid(r0, r1) 20:24:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) 20:24:35 executing program 3: set_mempolicy(0x0, 0x0, 0x2003) 20:24:35 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0x3, 0x1) 20:24:35 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="332a634d53f0213749b158c9fe0e00f3f904ca3c6685f427bc838a1f81e1dfd928755d56075a206d820e678212cc6ee885a287d985efbc19036a49044931f60052a3d8c772e7c719b683bbe90e1fdb54b1c98d", 0x53, 0x4040000, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setregid(r0, r2) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x10, &(0x7f00000004c0)) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100000, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}, {@cache_fscache}, {@fscache}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@audit}, {@obj_user={'obj_user', 0x3d, '{#'}}, {@measure}, {@euid_lt={'euid<', r1}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="332a634d53f0213749b158c9fe0e00f3f904ca3c6685f427bc838a1f81e1dfd928755d56075a206d820e678212cc6ee885a287d985efbc19036a49044931f60052a3d8c772e7c719b683bbe90e1fdb54b1c98d", 0x53, 0x4040000, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) (async) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000) (async) setregid(r0, r2) (async) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x10, &(0x7f00000004c0)) (async) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100000, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}, {@cache_fscache}, {@fscache}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@audit}, {@obj_user={'obj_user', 0x3d, '{#'}}, {@measure}, {@euid_lt={'euid<', r1}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) (async) 20:24:35 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 20:24:35 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) setregid(r0, 0xee01) (async) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000000c0)) (async) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x7, 0xfffffefb}}, './file0\x00'}) 20:24:35 executing program 3: set_mempolicy(0x0, 0x0, 0x2003) 20:24:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) set_mempolicy(0x8000, &(0x7f0000000000)=0x3, 0x1) 20:24:36 executing program 3: set_mempolicy(0x0, 0x0, 0x2003) set_mempolicy(0x0, 0x0, 0x2003) (async) 20:24:36 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000340)="332a634d53f0213749b158c9fe0e00f3f904ca3c6685f427bc838a1f81e1dfd928755d56075a206d820e678212cc6ee885a287d985efbc19036a49044931f60052a3d8c772e7c719b683bbe90e1fdb54b1c98d", 0x53, 0x4040000, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) pivot_root(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setregid(r0, r2) (async) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x10, &(0x7f00000004c0)) (async) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100000, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}, {@cache_fscache}, {@fscache}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@audit}, {@obj_user={'obj_user', 0x3d, '{#'}}, {@measure}, {@euid_lt={'euid<', r1}}, {@dont_measure}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}]}}) 20:24:36 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) setregid(r0, 0xee01) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f00000000c0)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x7, 0xfffffefb}}, './file0\x00'}) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() setregid(r0, r1) 20:24:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 20:24:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xffff, 0x7) (async, rerun: 64) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async, rerun: 64) set_mempolicy(0x8000, &(0x7f0000000000)=0x3, 0x1) 20:24:36 executing program 3: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(0xffffffffffffffff, 0xc02064cc, &(0x7f0000000040)={r0, 0x0, 0x88dc, 0x1, 0x1}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:24:36 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000080)) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @null, @rose, @default, @bcast, @remote, @null, @bcast]}, &(0x7f0000000180)=0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x53}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) 20:24:36 executing program 4: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r0, r1) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() 20:24:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 20:24:36 executing program 2: setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@ng={0x4, 0x8, "9eba6e4b4294e60fc8f7f62bc04cab11fd"}, 0x13, 0x3) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:36 executing program 3: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(0xffffffffffffffff, 0xc02064cc, &(0x7f0000000040)={r0, 0x0, 0x88dc, 0x1, 0x1}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(0xffffffffffffffff, 0xc02064cc, &(0x7f0000000040)={r0, 0x0, 0x88dc, 0x1, 0x1}) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) 20:24:36 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000080)) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @null, @rose, @default, @bcast, @remote, @null, @bcast]}, &(0x7f0000000180)=0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x53}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) setregid(0x0, 0xee01) (async) stat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000080)) (async) accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @null, @rose, @default, @bcast, @remote, @null, @bcast]}, &(0x7f0000000180)=0x48) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x53}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) (async) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 20:24:36 executing program 4: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r0, r1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800) (async) setregid(r0, r1) (async) 20:24:36 executing program 3: ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(0xffffffffffffffff, 0xc02064cc, &(0x7f0000000040)={r0, 0x0, 0x88dc, 0x1, 0x1}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(0xffffffffffffffff, 0xc02064cc, &(0x7f0000000040)={r0, 0x0, 0x88dc, 0x1, 0x1}) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) 20:24:36 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000080)) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @null, @rose, @default, @bcast, @remote, @null, @bcast]}, &(0x7f0000000180)=0x48) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x53}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) setregid(0x0, 0xee01) (async) stat(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000080)) (async) accept$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @netrom}, [@rose, @null, @rose, @default, @bcast, @remote, @null, @bcast]}, &(0x7f0000000180)=0x48) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x53}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) (async) 20:24:36 executing program 5: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() setregid(r0, r1) 20:24:36 executing program 2: setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@ng={0x4, 0x8, "9eba6e4b4294e60fc8f7f62bc04cab11fd"}, 0x13, 0x3) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@ng={0x4, 0x8, "9eba6e4b4294e60fc8f7f62bc04cab11fd"}, 0x13, 0x3) (async) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:36 executing program 4: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setregid(r0, r1) 20:24:36 executing program 1: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @null, @remote, @remote, @null]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000240)=""/25, 0x19}], 0x5, &(0x7f0000000480)=""/227, 0xe3}, 0x40010000) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x4, 0x45a0, 0x4, 0x4b, 0x8000009, 0x1f, 0x7, 0x7, 0x5], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r6, 0xc02064c3, 0x0) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0x2) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r1}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f0000000680)={&(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[{}], 0x899, 0x0, '\x00', 0x7, 0x1}) setregid(0xee01, 0xee00) 20:24:36 executing program 2: setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=@ng={0x4, 0x8, "9eba6e4b4294e60fc8f7f62bc04cab11fd"}, 0x13, 0x3) (async) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:36 executing program 3: ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) r0 = socket(0x18, 0x3, 0x6) getsockname$ax25(r0, &(0x7f0000000040)={{}, [@default, @remote, @null, @bcast, @rose, @null, @netrom, @bcast]}, &(0x7f00000000c0)=0x48) set_mempolicy(0x4000, &(0x7f0000000000)=0x1, 0x8001) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x6000) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 5: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) getegid() setregid(r0, r1) 20:24:36 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB='\t\x00\x00\x00e0\x00']) lchown(&(0x7f0000000240)='./file0\x00', r1, r0) 20:24:36 executing program 3: ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) r0 = socket(0x18, 0x3, 0x6) getsockname$ax25(r0, &(0x7f0000000040)={{}, [@default, @remote, @null, @bcast, @rose, @null, @netrom, @bcast]}, &(0x7f00000000c0)=0x48) set_mempolicy(0x4000, &(0x7f0000000000)=0x1, 0x8001) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x6000) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040), 0x4) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=0x10, 0x4) set_mempolicy(0x1, &(0x7f0000000140)=0x7f, 0x4) 20:24:36 executing program 1: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @null, @remote, @remote, @null]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000240)=""/25, 0x19}], 0x5, &(0x7f0000000480)=""/227, 0xe3}, 0x40010000) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x4, 0x45a0, 0x4, 0x4b, 0x8000009, 0x1f, 0x7, 0x7, 0x5], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r6, 0xc02064c3, 0x0) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0x2) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r1}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f0000000680)={&(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[{}], 0x899, 0x0, '\x00', 0x7, 0x1}) setregid(0xee01, 0xee00) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @null, @remote, @remote, @null]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000240)=""/25, 0x19}], 0x5, &(0x7f0000000480)=""/227, 0xe3}, 0x40010000) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x1}) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x4, 0x45a0, 0x4, 0x4b, 0x8000009, 0x1f, 0x7, 0x7, 0x5], 0x7, 0x80800}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r6, 0xc02064c3, 0x0) (async) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0x2) (async) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r1}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f0000000680)={&(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[{}], 0x899, 0x0, '\x00', 0x7, 0x1}) (async) setregid(0xee01, 0xee00) (async) 20:24:36 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000280)={0x80000001, 0x9, &(0x7f00000001c0)=[0x2, 0x2, 0x401, 0x8, 0xfff, 0x0, 0x1f, 0x7, 0x17], &(0x7f0000000200)=[0x101, 0x1f, 0x4, 0x9], &(0x7f0000000240)=[0x2ea6]}) 20:24:36 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB='\t\x00\x00\x00e0\x00']) lchown(&(0x7f0000000240)='./file0\x00', r1, r0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)) (async) setregid(r2, r0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB='\t\x00\x00\x00e0\x00']) (async) lchown(&(0x7f0000000240)='./file0\x00', r1, r0) (async) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x6000) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 3: ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) r0 = socket(0x18, 0x3, 0x6) getsockname$ax25(r0, &(0x7f0000000040)={{}, [@default, @remote, @null, @bcast, @rose, @null, @netrom, @bcast]}, &(0x7f00000000c0)=0x48) (async) set_mempolicy(0x4000, &(0x7f0000000000)=0x1, 0x8001) 20:24:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040), 0x4) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=0x10, 0x4) set_mempolicy(0x1, &(0x7f0000000140)=0x7f, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040), 0x4) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) (async) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=0x10, 0x4) (async) set_mempolicy(0x1, &(0x7f0000000140)=0x7f, 0x4) (async) 20:24:36 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000280)={0x80000001, 0x9, &(0x7f00000001c0)=[0x2, 0x2, 0x401, 0x8, 0xfff, 0x0, 0x1f, 0x7, 0x17], &(0x7f0000000200)=[0x101, 0x1f, 0x4, 0x9], &(0x7f0000000240)=[0x2ea6]}) 20:24:36 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB='\t\x00\x00\x00e0\x00']) lchown(&(0x7f0000000240)='./file0\x00', r1, r0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)) (async) setregid(r2, r0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB='\t\x00\x00\x00e0\x00']) (async) lchown(&(0x7f0000000240)='./file0\x00', r1, r0) (async) 20:24:36 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 1: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @null, @remote, @remote, @null]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000240)=""/25, 0x19}], 0x5, &(0x7f0000000480)=""/227, 0xe3}, 0x40010000) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x1}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x4, 0x45a0, 0x4, 0x4b, 0x8000009, 0x1f, 0x7, 0x7, 0x5], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r6, 0xc02064c3, 0x0) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0x2) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r1}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f0000000680)={&(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[{}], 0x899, 0x0, '\x00', 0x7, 0x1}) setregid(0xee01, 0xee00) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@ax25={{0x3, @bcast}, [@remote, @rose, @bcast, @null, @remote, @remote, @null]}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/2, 0x2}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f00000002c0)=""/161, 0xa1}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000240)=""/25, 0x19}], 0x5, &(0x7f0000000480)=""/227, 0xe3}, 0x40010000) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x1}) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r3, 0xc02064c3, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r5, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x80, 0x4, 0x45a0, 0x4, 0x4b, 0x8000009, 0x1f, 0x7, 0x7, 0x5], 0x7, 0x80800}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r6, 0xc02064c3, 0x0) (async) ioctl$VFIO_CHECK_EXTENSION(r6, 0x3b65, 0x2) (async) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000040)={0x0, r1}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r6, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f0000000680)={&(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[{}], 0x899, 0x0, '\x00', 0x7, 0x1}) (async) setregid(0xee01, 0xee00) (async) 20:24:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_GETGAMMA(r0, 0xc02064a4, &(0x7f0000000280)={0x80000001, 0x9, &(0x7f00000001c0)=[0x2, 0x2, 0x401, 0x8, 0xfff, 0x0, 0x1f, 0x7, 0x17], &(0x7f0000000200)=[0x101, 0x1f, 0x4, 0x9], &(0x7f0000000240)=[0x2ea6]}) 20:24:36 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040), 0x4) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000100)=0x10, 0x4) (async) set_mempolicy(0x1, &(0x7f0000000140)=0x7f, 0x4) 20:24:36 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:36 executing program 1: setregid(0x0, 0xee01) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+60000}}, 0x100) 20:24:36 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000100)) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000180)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000080)={&(0x7f00000001c0), 0x90059b3, 0x54, 0x2}) 20:24:36 executing program 4: setregid(0xee01, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {0x1, 0x4}, [], {0x4, 0x3}, [{0x8, 0x4}], {0x10, 0xb}, {0x20, 0x4}}, 0x2c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@md5={0x1, "bd353daa72e3548c722c16841c973d6e"}, 0x11, 0x2) 20:24:36 executing program 2: set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x0) socketpair(0x0, 0xa, 0x8973, &(0x7f0000000000)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:36 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x401}}, './file0\x00'}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) 20:24:36 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 1: setregid(0x0, 0xee01) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+60000}}, 0x100) setregid(0x0, 0xee01) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+60000}}, 0x100) (async) 20:24:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000100)) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000180)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000080)={&(0x7f00000001c0), 0x90059b3, 0x54, 0x2}) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000100)) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000180)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000080)={&(0x7f00000001c0), 0x90059b3, 0x54, 0x2}) (async) 20:24:37 executing program 5: mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@xattr}, {@xattr}, {@noprefix}, {@none}, {@name={'name', 0x3d, '/dev/snd/timer\x00'}}], [{@obj_role={'obj_role', 0x3d, '/dev/snd/timer\x00'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 1: setregid(0x0, 0xee01) (async) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{r0, r1/1000+60000}}, 0x100) 20:24:37 executing program 4: setregid(0xee01, 0x0) (async) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {0x1, 0x4}, [], {0x4, 0x3}, [{0x8, 0x4}], {0x10, 0xb}, {0x20, 0x4}}, 0x2c, 0x2) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@md5={0x1, "bd353daa72e3548c722c16841c973d6e"}, 0x11, 0x2) 20:24:37 executing program 2: set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x0) socketpair(0x0, 0xa, 0x8973, &(0x7f0000000000)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x0) (async) socketpair(0x0, 0xa, 0x8973, &(0x7f0000000000)) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) (async, rerun: 32) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) (async, rerun: 64) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)) (async, rerun: 64) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000100)) (async) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000180)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000080)={&(0x7f00000001c0), 0x90059b3, 0x54, 0x2}) 20:24:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x101) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 1: setregid(0x0, 0xee01) r0 = socket$vsock_stream(0x28, 0x1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'L-[&\\!\\'}}, {@mmap}, {@cachetag={'cachetag', 0x3d, ']'}}, {@mmap}, {@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@fsname}]}}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200), 0xa08c0, 0x0) 20:24:37 executing program 4: setregid(0xee01, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {0x1, 0x4}, [], {0x4, 0x3}, [{0x8, 0x4}], {0x10, 0xb}, {0x20, 0x4}}, 0x2c, 0x2) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@md5={0x1, "bd353daa72e3548c722c16841c973d6e"}, 0x11, 0x2) 20:24:37 executing program 5: set_mempolicy(0x0, 0x0, 0x101) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 5: set_mempolicy(0x0, 0x0, 0x101) 20:24:37 executing program 4: setregid(0xee01, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 20:24:37 executing program 1: setregid(0x0, 0xee01) (async) r0 = socket$vsock_stream(0x28, 0x1, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'L-[&\\!\\'}}, {@mmap}, {@cachetag={'cachetag', 0x3d, ']'}}, {@mmap}, {@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@fsname}]}}) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200), 0xa08c0, 0x0) 20:24:37 executing program 3: set_mempolicy(0x4000, 0x0, 0x4) mount$nfs(&(0x7f0000000000)=')\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x200000, &(0x7f00000000c0)={[{'-$\x19*/+$&'}, {'-@)*(:%^,'}, {'/\'\x1e&,$.'}, {'/\xb4'}, {':*'}, {'&+'}], [{@audit}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 20:24:37 executing program 2: set_mempolicy(0x4000, &(0x7f00000000c0)=0x1, 0x0) (async) socketpair(0x0, 0xa, 0x8973, &(0x7f0000000000)) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 4: setregid(0xee01, 0x0) (async) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 20:24:37 executing program 5: set_mempolicy(0x0, 0x0, 0x101) 20:24:37 executing program 1: setregid(0x0, 0xee01) r0 = socket$vsock_stream(0x28, 0x1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'L-[&\\!\\'}}, {@mmap}, {@cachetag={'cachetag', 0x3d, ']'}}, {@mmap}, {@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@fsname}]}}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200), 0xa08c0, 0x0) setregid(0x0, 0xee01) (async) socket$vsock_stream(0x28, 0x1, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800000, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'L-[&\\!\\'}}, {@mmap}, {@cachetag={'cachetag', 0x3d, ']'}}, {@mmap}, {@cache_fscache}, {@dfltuid={'dfltuid', 0x3d, r1}}], [{@fsname}]}}) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200), 0xa08c0, 0x0) (async) 20:24:37 executing program 4: setregid(0xee01, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) setregid(0xee01, 0x0) (async) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) (async) 20:24:37 executing program 3: set_mempolicy(0x4000, 0x0, 0x4) mount$nfs(&(0x7f0000000000)=')\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x200000, &(0x7f00000000c0)={[{'-$\x19*/+$&'}, {'-@)*(:%^,'}, {'/\'\x1e&,$.'}, {'/\xb4'}, {':*'}, {'&+'}], [{@audit}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 20:24:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000), 0x101) 20:24:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom}, [@rose, @remote, @default, @bcast, @bcast, @remote, @rose, @netrom]}, &(0x7f0000000040)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x408, 0x4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 3: set_mempolicy(0x4000, 0x0, 0x4) mount$nfs(&(0x7f0000000000)=')\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x200000, &(0x7f00000000c0)={[{'-$\x19*/+$&'}, {'-@)*(:%^,'}, {'/\'\x1e&,$.'}, {'/\xb4'}, {':*'}, {'&+'}], [{@audit}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) 20:24:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom}, [@rose, @remote, @default, @bcast, @bcast, @remote, @rose, @netrom]}, &(0x7f0000000040)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x408, 0x4) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:37 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)) mount$nfs(&(0x7f0000000740)='\n#)-*+]^%\x00\x00\x00\x00\x00\x00\x00\x00\xef:\xfd`\xb0c\xfe\xe6\xece\a\x8f\x98X\xd2\x18\xa7(\x1f\x974\x00\x19\x8c\x96\xca]\xad\xcf', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c5e5d2f7b24292c2b7b233a7f402c2c2c255e277d3a5d5c2c2b5e2d4f2c2c6673757569643d32353230196332302d353639512df73235642d656435352d6362385238323a652c7375626a5f747970653d2c2a402c252c736d61636b66736465663d2c61707072616973655f747970653d696d617369672c66736e616d653d2c7569643e", @ANYRESDEC=r0, @ANYBLOB="2c646f6e745f686173682c002ac2dcbb02000000000000002a4aace32ba008e2c2ac739a8abb89c70d51330ff3a19bf50e0bc30cac2c12e581b21ab6c1cb09e5dbbf60ecd42d7c51d96d83f472078dd6fffde1e1e5d180dbff7c31695fbe665ed28f89"]) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000940)={&(0x7f0000000100)=[0x8, 0x3ff, 0x9, 0x5, 0x5], 0x5, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r2, &(0x7f0000000980)='./file1\x00', 0x400, 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000480)={{0x1, 0x1, 0x18, r6, {0x7fff}}, './file0\x00'}) recvmsg$can_raw(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/221, 0xdd}, {&(0x7f0000000800)=""/148, 0x94}], 0x2, &(0x7f00000008c0)=""/95, 0x5f}, 0x10001) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r8, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r9}, './file1\x00'}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x808000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="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"]) 20:24:37 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x3800, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000500)={&(0x7f00000004c0)=[0xffff, 0x1, 0x4, 0x8001], 0x4}) stat(&(0x7f0000000140)='.\x00', &(0x7f0000000180)) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010025bd7000ffdbdf251100000005002f0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x40) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r0) 20:24:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:37 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = accept$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @netrom}, [@rose, @remote, @default, @bcast, @bcast, @remote, @rose, @netrom]}, &(0x7f0000000040)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x408, 0x4) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 1: setregid(0x0, 0xee01) (async) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)) (async) mount$nfs(&(0x7f0000000740)='\n#)-*+]^%\x00\x00\x00\x00\x00\x00\x00\x00\xef:\xfd`\xb0c\xfe\xe6\xece\a\x8f\x98X\xd2\x18\xa7(\x1f\x974\x00\x19\x8c\x96\xca]\xad\xcf', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c5e5d2f7b24292c2b7b233a7f402c2c2c255e277d3a5d5c2c2b5e2d4f2c2c6673757569643d32353230196332302d353639512df73235642d656435352d6362385238323a652c7375626a5f747970653d2c2a402c252c736d61636b66736465663d2c61707072616973655f747970653d696d617369672c66736e616d653d2c7569643e", @ANYRESDEC=r0, @ANYBLOB="2c646f6e745f686173682c002ac2dcbb02000000000000002a4aace32ba008e2c2ac739a8abb89c70d51330ff3a19bf50e0bc30cac2c12e581b21ab6c1cb09e5dbbf60ecd42d7c51d96d83f472078dd6fffde1e1e5d180dbff7c31695fbe665ed28f89"]) (async) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r1) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000940)={&(0x7f0000000100)=[0x8, 0x3ff, 0x9, 0x5, 0x5], 0x5, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r2, &(0x7f0000000980)='./file1\x00', 0x400, 0x1) (async) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000480)={{0x1, 0x1, 0x18, r6, {0x7fff}}, './file0\x00'}) recvmsg$can_raw(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/221, 0xdd}, {&(0x7f0000000800)=""/148, 0x94}], 0x2, &(0x7f00000008c0)=""/95, 0x5f}, 0x10001) (async) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r8, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r9}, './file1\x00'}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x808000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="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"]) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', r1, 0x80, 0x0, 0x9, 0x4, {{0x31, 0x4, 0x1, 0x0, 0xc4, 0x64, 0x0, 0xf7, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x18}, {[@cipso={0x86, 0x3d, 0x3, [{0x5, 0xa, "9f5066b5546cb982"}, {0x2, 0x12, "bdcb54785927e41dcaff85509685486e"}, {0x6, 0x9, "54363591c88936"}, {0x5, 0x12, "a881669c1a49bdf82fdf9cf5fef1e324"}]}, @ssrr={0x89, 0x7, 0x22, [@broadcast]}, @end, @timestamp_prespec={0x44, 0x4c, 0x56, 0x3, 0x3, [{@multicast2, 0x10000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@empty, 0x5}, {@broadcast, 0x2}, {@local, 0x3ff}, {@rand_addr=0x64010101, 0x20}, {@remote, 0x4}, {@multicast2, 0xad}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp_addr={0x44, 0x1c, 0xf1, 0x1, 0x2, [{@empty, 0xffffffff}, {@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x23}, 0xf7b}]}, @end]}}}}}) 20:24:37 executing program 5: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:37 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffff9, 0x6) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x30681) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', r1, 0x80, 0x0, 0x9, 0x4, {{0x31, 0x4, 0x1, 0x0, 0xc4, 0x64, 0x0, 0xf7, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x18}, {[@cipso={0x86, 0x3d, 0x3, [{0x5, 0xa, "9f5066b5546cb982"}, {0x2, 0x12, "bdcb54785927e41dcaff85509685486e"}, {0x6, 0x9, "54363591c88936"}, {0x5, 0x12, "a881669c1a49bdf82fdf9cf5fef1e324"}]}, @ssrr={0x89, 0x7, 0x22, [@broadcast]}, @end, @timestamp_prespec={0x44, 0x4c, 0x56, 0x3, 0x3, [{@multicast2, 0x10000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@empty, 0x5}, {@broadcast, 0x2}, {@local, 0x3ff}, {@rand_addr=0x64010101, 0x20}, {@remote, 0x4}, {@multicast2, 0xad}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp_addr={0x44, 0x1c, 0xf1, 0x1, 0x2, [{@empty, 0xffffffff}, {@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x23}, 0xf7b}]}, @end]}}}}}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', r1, 0x80, 0x0, 0x9, 0x4, {{0x31, 0x4, 0x1, 0x0, 0xc4, 0x64, 0x0, 0xf7, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x18}, {[@cipso={0x86, 0x3d, 0x3, [{0x5, 0xa, "9f5066b5546cb982"}, {0x2, 0x12, "bdcb54785927e41dcaff85509685486e"}, {0x6, 0x9, "54363591c88936"}, {0x5, 0x12, "a881669c1a49bdf82fdf9cf5fef1e324"}]}, @ssrr={0x89, 0x7, 0x22, [@broadcast]}, @end, @timestamp_prespec={0x44, 0x4c, 0x56, 0x3, 0x3, [{@multicast2, 0x10000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@empty, 0x5}, {@broadcast, 0x2}, {@local, 0x3ff}, {@rand_addr=0x64010101, 0x20}, {@remote, 0x4}, {@multicast2, 0xad}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp_addr={0x44, 0x1c, 0xf1, 0x1, 0x2, [{@empty, 0xffffffff}, {@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x23}, 0xf7b}]}, @end]}}}}}) (async) 20:24:37 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x3800, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000500)={&(0x7f00000004c0)=[0xffff, 0x1, 0x4, 0x8001], 0x4}) (async) stat(&(0x7f0000000140)='.\x00', &(0x7f0000000180)) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) (async, rerun: 64) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010025bd7000ffdbdf251100000005002f0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x40) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r0) 20:24:37 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)) mount$nfs(&(0x7f0000000740)='\n#)-*+]^%\x00\x00\x00\x00\x00\x00\x00\x00\xef:\xfd`\xb0c\xfe\xe6\xece\a\x8f\x98X\xd2\x18\xa7(\x1f\x974\x00\x19\x8c\x96\xca]\xad\xcf', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c5e5d2f7b24292c2b7b233a7f402c2c2c255e277d3a5d5c2c2b5e2d4f2c2c6673757569643d32353230196332302d353639512df73235642d656435352d6362385238323a652c7375626a5f747970653d2c2a402c252c736d61636b66736465663d2c61707072616973655f747970653d696d617369672c66736e616d653d2c7569643e", @ANYRESDEC=r0, @ANYBLOB="2c646f6e745f686173682c002ac2dcbb02000000000000002a4aace32ba008e2c2ac739a8abb89c70d51330ff3a19bf50e0bc30cac2c12e581b21ab6c1cb09e5dbbf60ecd42d7c51d96d83f472078dd6fffde1e1e5d180dbff7c31695fbe665ed28f89"]) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000940)={&(0x7f0000000100)=[0x8, 0x3ff, 0x9, 0x5, 0x5], 0x5, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r2, &(0x7f0000000980)='./file1\x00', 0x400, 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000480)={{0x1, 0x1, 0x18, r6, {0x7fff}}, './file0\x00'}) recvmsg$can_raw(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/221, 0xdd}, {&(0x7f0000000800)=""/148, 0x94}], 0x2, &(0x7f00000008c0)=""/95, 0x5f}, 0x10001) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r8, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r9}, './file1\x00'}) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x808000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="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"]) setregid(0x0, 0xee01) (async) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000280)) (async) mount$nfs(&(0x7f0000000740)='\n#)-*+]^%\x00\x00\x00\x00\x00\x00\x00\x00\xef:\xfd`\xb0c\xfe\xe6\xece\a\x8f\x98X\xd2\x18\xa7(\x1f\x974\x00\x19\x8c\x96\xca]\xad\xcf', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c5e5d2f7b24292c2b7b233a7f402c2c2c255e277d3a5d5c2c2b5e2d4f2c2c6673757569643d32353230196332302d353639512df73235642d656435352d6362385238323a652c7375626a5f747970653d2c2a402c252c736d61636b66736465663d2c61707072616973655f747970653d696d617369672c66736e616d653d2c7569643e", @ANYRESDEC=r0, @ANYBLOB="2c646f6e745f686173682c002ac2dcbb02000000000000002a4aace32ba008e2c2ac739a8abb89c70d51330ff3a19bf50e0bc30cac2c12e581b21ab6c1cb09e5dbbf60ecd42d7c51d96d83f472078dd6fffde1e1e5d180dbff7c31695fbe665ed28f89"]) (async) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r1) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000940)={&(0x7f0000000100)=[0x8, 0x3ff, 0x9, 0x5, 0x5], 0x5}) (async) mknodat$loop(r2, &(0x7f0000000980)='./file1\x00', 0x400, 0x1) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000480)={{0x1, 0x1, 0x18, r6, {0x7fff}}, './file0\x00'}) (async) recvmsg$can_raw(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)=""/221, 0xdd}, {&(0x7f0000000800)=""/148, 0x94}], 0x2, &(0x7f00000008c0)=""/95, 0x5f}, 0x10001) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r8, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r9}, './file1\x00'}) (async) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x808000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r9, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB="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"]) (async) 20:24:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffff9, 0x6) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x30681) set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffff9, 0x6) (async) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x30681) (async) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', r1, 0x80, 0x0, 0x9, 0x4, {{0x31, 0x4, 0x1, 0x0, 0xc4, 0x64, 0x0, 0xf7, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x18}, {[@cipso={0x86, 0x3d, 0x3, [{0x5, 0xa, "9f5066b5546cb982"}, {0x2, 0x12, "bdcb54785927e41dcaff85509685486e"}, {0x6, 0x9, "54363591c88936"}, {0x5, 0x12, "a881669c1a49bdf82fdf9cf5fef1e324"}]}, @ssrr={0x89, 0x7, 0x22, [@broadcast]}, @end, @timestamp_prespec={0x44, 0x4c, 0x56, 0x3, 0x3, [{@multicast2, 0x10000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@empty, 0x5}, {@broadcast, 0x2}, {@local, 0x3ff}, {@rand_addr=0x64010101, 0x20}, {@remote, 0x4}, {@multicast2, 0xad}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @timestamp_addr={0x44, 0x1c, 0xf1, 0x1, 0x2, [{@empty, 0xffffffff}, {@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x23}, 0xf7b}]}, @end]}}}}}) 20:24:37 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffff9, 0x6) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x30681) set_mempolicy(0x1, &(0x7f0000000040)=0xfffffffffffffff9, 0x6) (async) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x30681) (async) 20:24:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:37 executing program 1: setregid(0xee00, 0xffffffffffffffff) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000000)={0xffffffff, 0xaeb, 0x2, 0x2, 0x0, 0xaf1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, r0, r1], 0x81, 0x5, 0x5}) 20:24:37 executing program 2: set_mempolicy(0x8000, &(0x7f0000000040)=0xa95b, 0x80000000000008) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x3800, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000500)={&(0x7f00000004c0)=[0xffff, 0x1, 0x4, 0x8001], 0x4}) (async) stat(&(0x7f0000000140)='.\x00', &(0x7f0000000180)) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010025bd7000ffdbdf251100000005002f0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x40) statx(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r0) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000000)={0xffffffff, 0xaeb, 0x2, 0x2, 0x0, 0xaf1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, r0, r1], 0x81, 0x5, 0x5}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) (async) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000000)={0xffffffff, 0xaeb, 0x2, 0x2, 0x0, 0xaf1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, r0, r1], 0x81, 0x5, 0x5}) (async) 20:24:37 executing program 1: setregid(0xee00, 0xffffffffffffffff) 20:24:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 1: setregid(0xee00, 0xffffffffffffffff) setregid(0xee00, 0xffffffffffffffff) (async) 20:24:37 executing program 2: set_mempolicy(0x8000, &(0x7f0000000040)=0xa95b, 0x80000000000008) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 20:24:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000000)={0xffffffff, 0xaeb, 0x2, 0x2, 0x0, 0xaf1}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, r0, r1], 0x81, 0x5, 0x5}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)) (async) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000000)={0xffffffff, 0xaeb, 0x2, 0x2, 0x0, 0xaf1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, r0, r1], 0x81, 0x5, 0x5}) (async) 20:24:37 executing program 4: setregid(0xee01, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4b00, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x400}}, {}, {@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x34, 0x34, 0x65, 0x63, 0x7a721e98df97dca2, 0x30], 0x2d, [0x38, 0x39, 0x34, 0x34], 0x2d, [0x65, 0x39, 0x36, 0x30], 0x2d, [0x0, 0x65, 0x62, 0x64], 0x2d, [0x36, 0x34, 0x34, 0x38, 0x38, 0x34, 0x61, 0x31]}}}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x33, 0xc, 0x34, 0x39, 0x0, 0x36, 0x61], 0x2d, [0x0, 0x31, 0x30, 0x32], 0x2d, [0x64, 0x30, 0x36, 0x30], 0x2d, [0x63, 0x35, 0x65, 0x33], 0x2d, [0x38, 0x31, 0x34, 0x63, 0x30, 0x66, 0x63, 0x36]}}}, {@flag='mand'}, {@euid_eq}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) 20:24:37 executing program 2: set_mempolicy(0x8000, &(0x7f0000000040)=0xa95b, 0x80000000000008) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:37 executing program 4: setregid(0xee01, 0x0) (async) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4b00, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x400}}, {}, {@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x34, 0x34, 0x65, 0x63, 0x7a721e98df97dca2, 0x30], 0x2d, [0x38, 0x39, 0x34, 0x34], 0x2d, [0x65, 0x39, 0x36, 0x30], 0x2d, [0x0, 0x65, 0x62, 0x64], 0x2d, [0x36, 0x34, 0x34, 0x38, 0x38, 0x34, 0x61, 0x31]}}}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x33, 0xc, 0x34, 0x39, 0x0, 0x36, 0x61], 0x2d, [0x0, 0x31, 0x30, 0x32], 0x2d, [0x64, 0x30, 0x36, 0x30], 0x2d, [0x63, 0x35, 0x65, 0x33], 0x2d, [0x38, 0x31, 0x34, 0x63, 0x30, 0x66, 0x63, 0x36]}}}, {@flag='mand'}, {@euid_eq}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) 20:24:37 executing program 1: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x800}}, './file0\x00'}) setregid(0x0, 0xee01) 20:24:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x101) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x2) 20:24:37 executing program 4: setregid(0xee01, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4b00, 0x2) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x400}}, {}, {@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x34, 0x34, 0x65, 0x63, 0x7a721e98df97dca2, 0x30], 0x2d, [0x38, 0x39, 0x34, 0x34], 0x2d, [0x65, 0x39, 0x36, 0x30], 0x2d, [0x0, 0x65, 0x62, 0x64], 0x2d, [0x36, 0x34, 0x34, 0x38, 0x38, 0x34, 0x61, 0x31]}}}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x33, 0xc, 0x34, 0x39, 0x0, 0x36, 0x61], 0x2d, [0x0, 0x31, 0x30, 0x32], 0x2d, [0x64, 0x30, 0x36, 0x30], 0x2d, [0x63, 0x35, 0x65, 0x33], 0x2d, [0x38, 0x31, 0x34, 0x63, 0x30, 0x66, 0x63, 0x36]}}}, {@flag='mand'}, {@euid_eq}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) setregid(0xee01, 0x0) (async) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4b00, 0x2) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x400}}, {}, {@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x34, 0x34, 0x65, 0x63, 0x7a721e98df97dca2, 0x30], 0x2d, [0x38, 0x39, 0x34, 0x34], 0x2d, [0x65, 0x39, 0x36, 0x30], 0x2d, [0x0, 0x65, 0x62, 0x64], 0x2d, [0x36, 0x34, 0x34, 0x38, 0x38, 0x34, 0x61, 0x31]}}}, {@dont_hash}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x33, 0xc, 0x34, 0x39, 0x0, 0x36, 0x61], 0x2d, [0x0, 0x31, 0x30, 0x32], 0x2d, [0x64, 0x30, 0x36, 0x30], 0x2d, [0x63, 0x35, 0x65, 0x33], 0x2d, [0x38, 0x31, 0x34, 0x63, 0x30, 0x66, 0x63, 0x36]}}}, {@flag='mand'}, {@euid_eq}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) (async) 20:24:37 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, {0x101}}, './file1\x00'}) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6000, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@obj_user={'obj_user', 0x3d, '/dev/snd/timer\x00'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@flag='rw'}]}}) execve(&(0x7f0000001040)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001080)='fscontext', &(0x7f00000010c0)='/\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='appraise_type=imasig', &(0x7f0000001180)='[\x00', &(0x7f00000011c0)='dfltuid', &(0x7f0000001200)='fscontext', &(0x7f0000001240)='staff_u']) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r3, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000019", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f0000001580)={&(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[{}, {}, {}, {}], 0x10001, 0x0, '\x00', 0x2, 0x4}) faccessat(r3, &(0x7f0000001300)='./file0\x00', 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x402d00) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) set_mempolicy(0x1, &(0x7f00000012c0)=0xbcbf, 0xfffffffffffffff7) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = accept$nfc_llcp(r0, &(0x7f0000001340), &(0x7f00000013c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MARK_BUFS(r7, 0x40206417, &(0x7f0000001600)={0x2, 0x8, 0xb8, 0x92, 0x1, 0x4}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001400)) 20:24:37 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x101) 20:24:37 executing program 1: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x800}}, './file0\x00'}) (async) setregid(0x0, 0xee01) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x2) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x2) (async) 20:24:37 executing program 1: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x800}}, './file0\x00'}) setregid(0x0, 0xee01) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x800}}, './file0\x00'}) (async) setregid(0x0, 0xee01) (async) 20:24:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:37 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x2) 20:24:37 executing program 4: setregid(0xee01, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/89, 0x59}, {&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f0000000100)=""/203, 0xcb}, {&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/74, 0x4a}], 0x8, &(0x7f0000000700)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000020000005641a844842c64e5796a18c477f4558a4a7d1521fd17d8e63ce1a7fe37641b6cd9489744b2af7d59cf29d3ac8c1f7eb593f11e2e73ca3f4c5988a27a0c682a52c66de9c14b6bad77bedc5b711f7d9ebd3dab714a16fef85526f2978e7c0287cb76314690d504dcce5dfae2e72d2315b794b3fb856b442d6d71dd5573", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x1) 20:24:37 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, {0x101}}, './file1\x00'}) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6000, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@obj_user={'obj_user', 0x3d, '/dev/snd/timer\x00'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@flag='rw'}]}}) execve(&(0x7f0000001040)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001080)='fscontext', &(0x7f00000010c0)='/\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='appraise_type=imasig', &(0x7f0000001180)='[\x00', &(0x7f00000011c0)='dfltuid', &(0x7f0000001200)='fscontext', &(0x7f0000001240)='staff_u']) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r3, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000019", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f0000001580)={&(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[{}, {}, {}, {}], 0x10001, 0x0, '\x00', 0x2, 0x4}) faccessat(r3, &(0x7f0000001300)='./file0\x00', 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x402d00) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) set_mempolicy(0x1, &(0x7f00000012c0)=0xbcbf, 0xfffffffffffffff7) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = accept$nfc_llcp(r0, &(0x7f0000001340), &(0x7f00000013c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MARK_BUFS(r7, 0x40206417, &(0x7f0000001600)={0x2, 0x8, 0xb8, 0x92, 0x1, 0x4}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001400)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, {0x101}}, './file1\x00'}) (async) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6000, 0x8, &(0x7f00000003c0)) (async) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@obj_user={'obj_user', 0x3d, '/dev/snd/timer\x00'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@flag='rw'}]}}) (async) execve(&(0x7f0000001040)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001080)='fscontext', &(0x7f00000010c0)='/\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='appraise_type=imasig', &(0x7f0000001180)='[\x00', &(0x7f00000011c0)='dfltuid', &(0x7f0000001200)='fscontext', &(0x7f0000001240)='staff_u']) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r3, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000019", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f0000001580)={&(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[{}, {}, {}, {}], 0x10001, 0x0, '\x00', 0x2, 0x4}) (async) faccessat(r3, &(0x7f0000001300)='./file0\x00', 0x1) (async) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x402d00) (async) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) (async) set_mempolicy(0x1, &(0x7f00000012c0)=0xbcbf, 0xfffffffffffffff7) (async) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) accept$nfc_llcp(r0, &(0x7f0000001340), &(0x7f00000013c0)=0x60) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file1\x00'}) (async) ioctl$DRM_IOCTL_MARK_BUFS(r7, 0x40206417, &(0x7f0000001600)={0x2, 0x8, 0xb8, 0x92, 0x1, 0x4}) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001400)) (async) 20:24:37 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x101) 20:24:37 executing program 3: set_mempolicy(0x0, 0x0, 0x7) 20:24:37 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x200, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, 0xee01) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@xattr}, {@cpuset_v2_mode}, {@noprefix}], [{@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@flag='async'}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\''}}, {@subj_user={'subj_user', 0x3d, '),\'('}}]}) 20:24:37 executing program 4: setregid(0xee01, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/89, 0x59}, {&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f0000000100)=""/203, 0xcb}, {&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/74, 0x4a}], 0x8, &(0x7f0000000700)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000020000005641a844842c64e5796a18c477f4558a4a7d1521fd17d8e63ce1a7fe37641b6cd9489744b2af7d59cf29d3ac8c1f7eb593f11e2e73ca3f4c5988a27a0c682a52c66de9c14b6bad77bedc5b711f7d9ebd3dab714a16fef85526f2978e7c0287cb76314690d504dcce5dfae2e72d2315b794b3fb856b442d6d71dd5573", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x1) 20:24:37 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 0: set_mempolicy(0x0, 0x0, 0x101) 20:24:38 executing program 3: set_mempolicy(0x0, 0x0, 0x7) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, {0x101}}, './file1\x00'}) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6000, 0x8, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@obj_user={'obj_user', 0x3d, '/dev/snd/timer\x00'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@flag='rw'}]}}) execve(&(0x7f0000001040)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001080)='fscontext', &(0x7f00000010c0)='/\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='appraise_type=imasig', &(0x7f0000001180)='[\x00', &(0x7f00000011c0)='dfltuid', &(0x7f0000001200)='fscontext', &(0x7f0000001240)='staff_u']) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r3, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000019", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f0000001580)={&(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[{}, {}, {}, {}], 0x10001, 0x0, '\x00', 0x2, 0x4}) faccessat(r3, &(0x7f0000001300)='./file0\x00', 0x1) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x402d00) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) set_mempolicy(0x1, &(0x7f00000012c0)=0xbcbf, 0xfffffffffffffff7) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r6 = accept$nfc_llcp(r0, &(0x7f0000001340), &(0x7f00000013c0)=0x60) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MARK_BUFS(r7, 0x40206417, &(0x7f0000001600)={0x2, 0x8, 0xb8, 0x92, 0x1, 0x4}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001400)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001640)={{0x1, 0x1, 0x18, r0, {0x101}}, './file1\x00'}) (async) statx(r1, &(0x7f0000000380)='./file0\x00', 0x6000, 0x8, &(0x7f00000003c0)) (async) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x2000000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_user}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@obj_user={'obj_user', 0x3d, '/dev/snd/timer\x00'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@flag='rw'}]}}) (async) execve(&(0x7f0000001040)='./file0\x00', &(0x7f0000001100)=[&(0x7f0000001080)='fscontext', &(0x7f00000010c0)='/\x00'], &(0x7f0000001280)=[&(0x7f0000001140)='appraise_type=imasig', &(0x7f0000001180)='[\x00', &(0x7f00000011c0)='dfltuid', &(0x7f0000001200)='fscontext', &(0x7f0000001240)='staff_u']) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r3, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f0000001440)=ANY=[@ANYBLOB="010000000100000018000019", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f0000001580)={&(0x7f0000001480)=[0x0, 0x0], &(0x7f00000014c0)=[{}, {}, {}, {}], 0x10001, 0x0, '\x00', 0x2, 0x4}) (async) faccessat(r3, &(0x7f0000001300)='./file0\x00', 0x1) (async) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x402d00) (async) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) (async) set_mempolicy(0x1, &(0x7f00000012c0)=0xbcbf, 0xfffffffffffffff7) (async) ioctl$VFAT_IOCTL_READDIR_SHORT(r5, 0x82307202, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) accept$nfc_llcp(r0, &(0x7f0000001340), &(0x7f00000013c0)=0x60) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000015c0)={{0x1, 0x1, 0x18, r5, {0x2}}, './file1\x00'}) (async) ioctl$DRM_IOCTL_MARK_BUFS(r7, 0x40206417, &(0x7f0000001600)={0x2, 0x8, 0xb8, 0x92, 0x1, 0x4}) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000001400)) (async) 20:24:38 executing program 4: setregid(0xee01, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/89, 0x59}, {&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f0000000100)=""/203, 0xcb}, {&(0x7f0000000200)=""/202, 0xca}, {&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/74, 0x4a}], 0x8, &(0x7f0000000700)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c0000000000000001000000020000005641a844842c64e5796a18c477f4558a4a7d1521fd17d8e63ce1a7fe37641b6cd9489744b2af7d59cf29d3ac8c1f7eb593f11e2e73ca3f4c5988a27a0c682a52c66de9c14b6bad77bedc5b711f7d9ebd3dab714a16fef85526f2978e7c0287cb76314690d504dcce5dfae2e72d2315b794b3fb856b442d6d71dd5573", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x1) 20:24:38 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x200, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, 0xee01) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@xattr}, {@cpuset_v2_mode}, {@noprefix}], [{@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@flag='async'}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\''}}, {@subj_user={'subj_user', 0x3d, '),\'('}}]}) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x200, &(0x7f0000000040)) (async) setregid(r1, 0xee01) (async) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@xattr}, {@cpuset_v2_mode}, {@noprefix}], [{@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@flag='async'}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\''}}, {@subj_user={'subj_user', 0x3d, '),\'('}}]}) (async) 20:24:38 executing program 3: set_mempolicy(0x0, 0x0, 0x7) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 0: set_mempolicy(0x0, 0x0, 0x101) 20:24:38 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@remote, @netrom, @rose, @default, @rose, @remote, @remote, @null]}, &(0x7f0000000080)=0x48) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0xc, 0x9, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}) setregid(0xee01, 0x0) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000001280)=0x9, 0x4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001240)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/33, 0x21}], 0x2, &(0x7f00000011c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40000000) 20:24:38 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@remote, @netrom, @rose, @default, @rose, @remote, @remote, @null]}, &(0x7f0000000080)=0x48) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0xc, 0x9, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}) (async) setregid(0xee01, 0x0) 20:24:38 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x200, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, 0xee01) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@xattr}, {@cpuset_v2_mode}, {@noprefix}], [{@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@flag='async'}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\''}}, {@subj_user={'subj_user', 0x3d, '),\'('}}]}) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x200, &(0x7f0000000040)) (async) setregid(r1, 0xee01) (async) mount$cgroup(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400, &(0x7f00000001c0)={[{@xattr}, {@cpuset_v2_mode}, {@noprefix}], [{@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@flag='async'}, {@dont_appraise}, {@subj_role={'subj_role', 0x3d, '\''}}, {@subj_user={'subj_user', 0x3d, '),\'('}}]}) (async) 20:24:38 executing program 0: set_mempolicy(0x0, 0x0, 0x101) 20:24:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}, 0x100) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x101002, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1400) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000180)='./file0\x00', 0x800, 0x103) 20:24:38 executing program 4: r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@remote, @netrom, @rose, @default, @rose, @remote, @remote, @null]}, &(0x7f0000000080)=0x48) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0xc, 0x9, 0x0, [@default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}) (async) setregid(0xee01, 0x0) 20:24:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}, 0x100) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x101002, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1400) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) mknodat$null(r1, &(0x7f0000000180)='./file0\x00', 0x800, 0x103) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 1: setregid(0x0, 0xee01) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) 20:24:38 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, 0x0, 0x0, 0x7ff, &(0x7f00000001c0)) 20:24:38 executing program 1: setregid(0x0, 0xee01) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) setregid(0x0, 0xee01) (async) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) (async) 20:24:38 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x0, &(0x7f0000001280)=0x9, 0x4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001240)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/33, 0x21}], 0x2, &(0x7f00000011c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40000000) 20:24:38 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}, 0x100) (async, rerun: 64) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x101002, 0x10) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) linkat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1400) (async, rerun: 32) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async, rerun: 32) mknodat$null(r1, &(0x7f0000000180)='./file0\x00', 0x800, 0x103) 20:24:38 executing program 4: setregid(0xee01, 0xee01) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)=""/236, 0xec}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x10041) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) r2 = socket$rds(0x15, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, &(0x7f0000001140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@fowner_lt={'fowner<', r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x35, 0x37, 0x30, 0x30, 0x64, 0x62], 0x2d, [0x61, 0x30, 0x33, 0x62], 0x2d, [0x30, 0x34, 0x50, 0x35], 0x2d, [0x62, 0x30, 0x36, 0xa39dcd4268e66104], 0x2d, [0x66, 0x33, 0x35, 0x9, 0x34, 0x96, 0x64, 0x39]}}}, {@flag='rw'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@dont_appraise}, {@dont_hash}]}}) 20:24:38 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:38 executing program 1: setregid(0x0, 0xee01) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)) 20:24:38 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000), 0x0, 0x140800, 0x0, 0xffffffffffffffff}) setregid(0x0, 0xee01) mount$9p_rdma(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x22000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,rq=0x0000000000000003,rq=0x000000000000007f,rq=0x00000000000004c3,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303038312c61707072616973655f747970653d696d617369672c00efb3d99b698c29022c7dbfc5536f1a473c8c7cd59cce982fd785c686d6d7b343631f8b2ea2fd3ef4827b46d07599df59149b68f1adcbfab42b879c2fa18401bed559f2a8111a103b4c39f4c6dd94af42f1372a30c54455160a919bc14eb7fe78e2264078babb1d71d0"]) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)={0x6, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 20:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:39 executing program 0: set_mempolicy(0x0, &(0x7f0000000000), 0x0) 20:24:39 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000), 0x0, 0x140800, 0x0, 0xffffffffffffffff}) (async, rerun: 32) setregid(0x0, 0xee01) (rerun: 32) mount$9p_rdma(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x22000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,rq=0x0000000000000003,rq=0x000000000000007f,rq=0x00000000000004c3,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303038312c61707072616973655f747970653d696d617369672c00efb3d99b698c29022c7dbfc5536f1a473c8c7cd59cce982fd785c686d6d7b343631f8b2ea2fd3ef4827b46d07599df59149b68f1adcbfab42b879c2fa18401bed559f2a8111a103b4c39f4c6dd94af42f1372a30c54455160a919bc14eb7fe78e2264078babb1d71d0"]) (async) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)={0x6, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 20:24:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:39 executing program 3: set_mempolicy(0x3, 0x0, 0x3ff) 20:24:39 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x0, &(0x7f0000001280)=0x9, 0x4) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001240)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/33, 0x21}], 0x2, &(0x7f00000011c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x40000000) 20:24:39 executing program 4: setregid(0xee01, 0xee01) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)=""/236, 0xec}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x10041) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) (async) r2 = socket$rds(0x15, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, &(0x7f0000001140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@fowner_lt={'fowner<', r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x35, 0x37, 0x30, 0x30, 0x64, 0x62], 0x2d, [0x61, 0x30, 0x33, 0x62], 0x2d, [0x30, 0x34, 0x50, 0x35], 0x2d, [0x62, 0x30, 0x36, 0xa39dcd4268e66104], 0x2d, [0x66, 0x33, 0x35, 0x9, 0x34, 0x96, 0x64, 0x39]}}}, {@flag='rw'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@dont_appraise}, {@dont_hash}]}}) 20:24:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:39 executing program 3: set_mempolicy(0x3, 0x0, 0x3ff) 20:24:39 executing program 1: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000), 0x0, 0x140800, 0x0, 0xffffffffffffffff}) setregid(0x0, 0xee01) mount$9p_rdma(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x22000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,rq=0x0000000000000003,rq=0x000000000000007f,rq=0x00000000000004c3,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303038312c61707072616973655f747970653d696d617369672c00efb3d99b698c29022c7dbfc5536f1a473c8c7cd59cce982fd785c686d6d7b343631f8b2ea2fd3ef4827b46d07599df59149b68f1adcbfab42b879c2fa18401bed559f2a8111a103b4c39f4c6dd94af42f1372a30c54455160a919bc14eb7fe78e2264078babb1d71d0"]) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)={0x6, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000), 0x0, 0x140800}) (async) setregid(0x0, 0xee01) (async) mount$9p_rdma(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x22000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,rq=0x0000000000000003,rq=0x000000000000007f,rq=0x00000000000004c3,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303038312c61707072616973655f747970653d696d617369672c00efb3d99b698c29022c7dbfc5536f1a473c8c7cd59cce982fd785c686d6d7b343631f8b2ea2fd3ef4827b46d07599df59149b68f1adcbfab42b879c2fa18401bed559f2a8111a103b4c39f4c6dd94af42f1372a30c54455160a919bc14eb7fe78e2264078babb1d71d0"]) (async) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) (async) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000080)={0x6, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) 20:24:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 20:24:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:39 executing program 3: set_mempolicy(0x3, 0x0, 0x3ff) 20:24:39 executing program 4: setregid(0xee01, 0xee01) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)=""/236, 0xec}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x10041) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) r2 = socket$rds(0x15, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, &(0x7f0000001140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@fowner_lt={'fowner<', r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x35, 0x37, 0x30, 0x30, 0x64, 0x62], 0x2d, [0x61, 0x30, 0x33, 0x62], 0x2d, [0x30, 0x34, 0x50, 0x35], 0x2d, [0x62, 0x30, 0x36, 0xa39dcd4268e66104], 0x2d, [0x66, 0x33, 0x35, 0x9, 0x34, 0x96, 0x64, 0x39]}}}, {@flag='rw'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@dont_appraise}, {@dont_hash}]}}) setregid(0xee01, 0xee01) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000080)=""/236, 0xec}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}, 0x10041) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) (async) socket$rds(0x15, 0x5, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x20, &(0x7f0000001140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [{@fowner_lt={'fowner<', r0}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x32, 0x35, 0x37, 0x30, 0x30, 0x64, 0x62], 0x2d, [0x61, 0x30, 0x33, 0x62], 0x2d, [0x30, 0x34, 0x50, 0x35], 0x2d, [0x62, 0x30, 0x36, 0xa39dcd4268e66104], 0x2d, [0x66, 0x33, 0x35, 0x9, 0x34, 0x96, 0x64, 0x39]}}}, {@flag='rw'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@permit_directio}, {@context={'context', 0x3d, 'root'}}, {@dont_appraise}, {@dont_hash}]}}) (async) 20:24:39 executing program 1: setregid(0x0, 0xee01) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) 20:24:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x10001, 0x80000000}}, './file0\x00'}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x4) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) 20:24:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r0, @ANYBLOB="00810000000000002e2f66696c653000"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000380)) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000b71e3539e96437f1cd845efc3253beca1b45497633a749e62ee7aba13613b4ef86287706dfd846fd3057d8890328f5e8b5afcd1ba9502e05449752572a18ef5c03ef6aa5eea6160f379e1bed8c1d81204239ce7c09000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x881}, 0x8090) set_mempolicy(0x1, &(0x7f00000001c0)=0x3, 0x73) socket$pppl2tp(0x18, 0x1, 0x1) quotactl(0x5000000000000000, &(0x7f0000000300)='./file0\x00', 0xee01, &(0x7f0000000340)="f0eadab3ab1e0723e96795408ebd39726cde8d878bd194b74df7d5bd087604a10d3361d43ed82085eed079b683e81e8c9d") sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xa1b}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044089}, 0x20040800) 20:24:40 executing program 1: setregid(0x0, 0xee01) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) 20:24:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x48) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 20:24:40 executing program 5: setregid(0x0, 0xee01) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) 20:24:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x10001, 0x80000000}}, './file0\x00'}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x4) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x10001, 0x80000000}}, './file0\x00'}) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x4) (async) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) (async) 20:24:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0xc61, 0x80) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc54b, 0x7ff}}, './file0\x00'}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(r0, 0xc02064cc, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffa0d, 0x3692, 0x1}) 20:24:40 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fee000/0x4000)=nil}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x103083) 20:24:40 executing program 1: setregid(0x0, 0xee01) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) 20:24:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x10001, 0x80000000}}, './file0\x00'}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x4) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x10001, 0x80000000}}, './file0\x00'}) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) set_mempolicy(0x4000, &(0x7f0000000000)=0x9, 0x4) (async) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0xee00) (async) 20:24:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0xc61, 0x80) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc54b, 0x7ff}}, './file0\x00'}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) (async) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(r0, 0xc02064cc, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffa0d, 0x3692, 0x1}) 20:24:40 executing program 0: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000002740)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5cfd}}, './file0\x00'}) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) linkat(r0, &(0x7f0000002780)='./file0\x00', r1, &(0x7f00000027c0)='./file1\x00', 0x1000) setregid(0x0, 0xee01) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f0000000000)=""/11, 0xb}, {&(0x7f0000000040)=""/67, 0x43}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/247, 0xf7}, {&(0x7f00000011c0)=""/185, 0xb9}, {&(0x7f0000001280)=""/73, 0x49}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/203, 0xcb}, {&(0x7f0000002400)=""/249, 0xf9}, {&(0x7f0000002500)=""/113, 0x71}], 0xa, &(0x7f0000002640)=""/122, 0x7a}, 0x2) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) openat(r2, &(0x7f0000002700)='./file0\x00', 0x0, 0x9) setregid(0x0, 0xee00) r3 = openat(0xffffffffffffff9c, &(0x7f0000002800)='./file0\x00', 0x0, 0x42) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000002840)={{0x1, 0x1, 0x18, r2, {0x0, 0x7fff}}, './file1\x00'}) 20:24:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r0, @ANYBLOB="00810000000000002e2f66696c653000"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000380)) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000b71e3539e96437f1cd845efc3253beca1b45497633a749e62ee7aba13613b4ef86287706dfd846fd3057d8890328f5e8b5afcd1ba9502e05449752572a18ef5c03ef6aa5eea6160f379e1bed8c1d81204239ce7c09000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x881}, 0x8090) set_mempolicy(0x1, &(0x7f00000001c0)=0x3, 0x73) socket$pppl2tp(0x18, 0x1, 0x1) quotactl(0x5000000000000000, &(0x7f0000000300)='./file0\x00', 0xee01, &(0x7f0000000340)="f0eadab3ab1e0723e96795408ebd39726cde8d878bd194b74df7d5bd087604a10d3361d43ed82085eed079b683e81e8c9d") sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xa1b}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044089}, 0x20040800) set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r0, @ANYBLOB="00810000000000002e2f66696c653000"]) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000380)) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000b71e3539e96437f1cd845efc3253beca1b45497633a749e62ee7aba13613b4ef86287706dfd846fd3057d8890328f5e8b5afcd1ba9502e05449752572a18ef5c03ef6aa5eea6160f379e1bed8c1d81204239ce7c09000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x881}, 0x8090) (async) set_mempolicy(0x1, &(0x7f00000001c0)=0x3, 0x73) (async) socket$pppl2tp(0x18, 0x1, 0x1) (async) quotactl(0x5000000000000000, &(0x7f0000000300)='./file0\x00', 0xee01, &(0x7f0000000340)="f0eadab3ab1e0723e96795408ebd39726cde8d878bd194b74df7d5bd087604a10d3361d43ed82085eed079b683e81e8c9d") (async) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xa1b}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044089}, 0x20040800) (async) 20:24:40 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fee000/0x4000)=nil}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x103083) 20:24:40 executing program 3: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:40 executing program 1: exit(0x0) setregid(0x0, 0xee01) 20:24:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000), 0xc61, 0x80) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc54b, 0x7ff}}, './file0\x00'}) (rerun: 32) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) (async) ioctl$DRM_IOCTL_SYNCOBJ_TRANSFER(r0, 0xc02064cc, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffa0d, 0x3692, 0x1}) 20:24:40 executing program 0: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x100000000) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f00000000c0)=""/240) r1 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000040)=0x60) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000240)={r1, 0x9, 0x2b1, "0e09b6cdb2ee3dcdc5add2beb6ae692b02e0e32a2700fd86"}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x3f}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r3, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x689f}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x196}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x20000044) 20:24:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x7) (async, rerun: 32) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r0, @ANYBLOB="00810000000000002e2f66696c653000"]) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r2, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000380)) (async, rerun: 64) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000b71e3539e96437f1cd845efc3253beca1b45497633a749e62ee7aba13613b4ef86287706dfd846fd3057d8890328f5e8b5afcd1ba9502e05449752572a18ef5c03ef6aa5eea6160f379e1bed8c1d81204239ce7c09000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x881}, 0x8090) (rerun: 64) set_mempolicy(0x1, &(0x7f00000001c0)=0x3, 0x73) (async) socket$pppl2tp(0x18, 0x1, 0x1) quotactl(0x5000000000000000, &(0x7f0000000300)='./file0\x00', 0xee01, &(0x7f0000000340)="f0eadab3ab1e0723e96795408ebd39726cde8d878bd194b74df7d5bd087604a10d3361d43ed82085eed079b683e81e8c9d") (async) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xa1b}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20044089}, 0x20040800) 20:24:40 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fee000/0x4000)=nil}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x103083) 20:24:40 executing program 3: set_mempolicy(0x1, 0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:40 executing program 4: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) setregid(0xee01, 0x0) 20:24:40 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000fee000/0x4000)=nil}) 20:24:40 executing program 0: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:40 executing program 4: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) setregid(0xee01, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) (async) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) (async) setregid(0xee01, 0x0) (async) 20:24:40 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) 20:24:40 executing program 3: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) set_mempolicy(0x1, 0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) (async) 20:24:41 executing program 1: exit(0x0) setregid(0x0, 0xee01) 20:24:41 executing program 2: set_mempolicy(0x3, &(0x7f00000010c0)=0xa959, 0x80000007) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x9], 0x1, 0x800}) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) socket$rds(0x15, 0x5, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000001080)=0x101, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000001040), 0x10042, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x80) 20:24:41 executing program 0: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:41 executing program 4: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) (async) setregid(0xee01, 0x0) 20:24:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="01cc00000000000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="faffffff000000002e2f66696c653000"]) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={0x0, 0x1, 0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) write$binfmt_script(r2, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\xfd]'}, {0x20, '(%]'}, {0x20, '&'}, {0x20, '{'}], 0xa, "035142cf12a2e4466d800420f4993e278f86ddfff7cb90454230ebcee6660772f7854c65c4cac0b2fdb6569b1a5e3c15a5c9325339cecc3401d408529fbd84411e6b93c35764213416746bd2"}, 0x62) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x10000}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:24:41 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:24:41 executing program 5: set_mempolicy(0x0, &(0x7f0000000080)=0x80803, 0x8021) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) 20:24:41 executing program 4: setregid(0xee01, 0x0) getegid() 20:24:41 executing program 2: set_mempolicy(0x3, &(0x7f00000010c0)=0xa959, 0x80000007) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x9], 0x1, 0x800}) (async) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) socket$rds(0x15, 0x5, 0x0) (async) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) (async) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000001080)=0x101, 0x4) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000001040), 0x10042, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x80) 20:24:41 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="01cc00000000000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="faffffff000000002e2f66696c653000"]) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={0x0, 0x1, 0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) (async, rerun: 32) write$binfmt_script(r2, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\xfd]'}, {0x20, '(%]'}, {0x20, '&'}, {0x20, '{'}], 0xa, "035142cf12a2e4466d800420f4993e278f86ddfff7cb90454230ebcee6660772f7854c65c4cac0b2fdb6569b1a5e3c15a5c9325339cecc3401d408529fbd84411e6b93c35764213416746bd2"}, 0x62) (async, rerun: 32) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x10000}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:24:41 executing program 0: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:41 executing program 5: mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x14000, 0x0, &(0x7f0000fec000/0x14000)=nil) 20:24:42 executing program 1: exit(0x0) setregid(0x0, 0xee01) exit(0x0) (async) setregid(0x0, 0xee01) (async) 20:24:42 executing program 2: set_mempolicy(0x3, &(0x7f00000010c0)=0xa959, 0x80000007) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x9], 0x1, 0x800}) (async) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) socket$rds(0x15, 0x5, 0x0) (async) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000001080)=0x101, 0x4) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000001040), 0x10042, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x80) 20:24:42 executing program 0: shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:42 executing program 4: setregid(0xee01, 0x0) (async) getegid() 20:24:42 executing program 3: ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="01cc00000000000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="faffffff000000002e2f66696c653000"]) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)={0x0, 0x1, 0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil}) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) write$binfmt_script(r2, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\xfd]'}, {0x20, '(%]'}, {0x20, '&'}, {0x20, '{'}], 0xa, "035142cf12a2e4466d800420f4993e278f86ddfff7cb90454230ebcee6660772f7854c65c4cac0b2fdb6569b1a5e3c15a5c9325339cecc3401d408529fbd84411e6b93c35764213416746bd2"}, 0x62) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x10000}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="01cc00000000000018000000", @ANYRES32, @ANYBLOB="faffffff000000002e2f66696c653000"]) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f00000000c0)) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000100)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil}) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\xfd]'}, {0x20, '(%]'}, {0x20, '&'}, {0x20, '{'}], 0xa, "035142cf12a2e4466d800420f4993e278f86ddfff7cb90454230ebcee6660772f7854c65c4cac0b2fdb6569b1a5e3c15a5c9325339cecc3401d408529fbd84411e6b93c35764213416746bd2"}, 0x62) (async) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x10000}) (async) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) 20:24:42 executing program 0: shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:42 executing program 0: shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:42 executing program 4: setregid(0xee01, 0x0) getegid() 20:24:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r2) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x44052) 20:24:42 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) setregid(0xee01, 0x0) 20:24:42 executing program 0: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:42 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="36c8e7f6010000001800000092bf32d02b6ebd55eba05af68476b68d41d36581f30715f0a33148e52875751c03a997d4b73253dfd71c769080168a800556981a8d0ffa4037dd1b6898dcfa", @ANYRES32=0xffffffffffffffff, @ANYBLOB="040093d83b463e481e15660800000000"]) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0, 0x1}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x90, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303095b45300302c757365725f69643deb8515a69054f111704f8c866a6828e348", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0xffffffffffffffff,allow_other,blksize=0x0000000000000200,allow_other,allow_other,allow_other,default_permissions,rootcontext=sysadm_u,permit_directio,appraise,\x00']) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000100)=[0x0, 0x0, r1, r2, r3, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x9, 0x1}) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r2) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x44052) 20:24:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) (async) setregid(0xee01, 0x0) 20:24:43 executing program 0: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:43 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="36c8e7f6010000001800000092bf32d02b6ebd55eba05af68476b68d41d36581f30715f0a33148e52875751c03a997d4b73253dfd71c769080168a800556981a8d0ffa4037dd1b6898dcfa", @ANYRES32=0xffffffffffffffff, @ANYBLOB="040093d83b463e481e15660800000000"]) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0, 0x1}) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x90, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303095b45300302c757365725f69643deb8515a69054f111704f8c866a6828e348", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0xffffffffffffffff,allow_other,blksize=0x0000000000000200,allow_other,allow_other,allow_other,default_permissions,rootcontext=sysadm_u,permit_directio,appraise,\x00']) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000100)=[0x0, 0x0, r1, r2, r3, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x9, 0x1}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="36c8e7f6010000001800000092bf32d02b6ebd55eba05af68476b68d41d36581f30715f0a33148e52875751c03a997d4b73253dfd71c769080168a800556981a8d0ffa4037dd1b6898dcfa", @ANYRES32, @ANYBLOB="040093d83b463e481e15660800000000"]) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0, 0x1}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x90, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303095b45300302c757365725f69643deb8515a69054f111704f8c866a6828e348", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0xffffffffffffffff,allow_other,blksize=0x0000000000000200,allow_other,allow_other,allow_other,default_permissions,rootcontext=sysadm_u,permit_directio,appraise,\x00']) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000100)=[0x0, 0x0, r1, r2, r3, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x9, 0x1}) (async) 20:24:43 executing program 1: r0 = socket(0x15, 0x6, 0x1f) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) setregid(0x0, 0xee00) 20:24:43 executing program 0: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x320, &(0x7f0000ffd000/0x3000)=nil) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r2) (async, rerun: 64) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x44052) (rerun: 64) 20:24:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) (async) setregid(0xee01, 0x0) 20:24:43 executing program 0: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:43 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="36c8e7f6010000001800000092bf32d02b6ebd55eba05af68476b68d41d36581f30715f0a33148e52875751c03a997d4b73253dfd71c769080168a800556981a8d0ffa4037dd1b6898dcfa", @ANYRES32=0xffffffffffffffff, @ANYBLOB="040093d83b463e481e15660800000000"]) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000040)={0x0}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000080)={0x0, 0x1}) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x90, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303095b45300302c757365725f69643deb8515a69054f111704f8c866a6828e348", @ANYRESDEC=0xee01, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',max_read=0xffffffffffffffff,allow_other,blksize=0x0000000000000200,allow_other,allow_other,allow_other,default_permissions,rootcontext=sysadm_u,permit_directio,appraise,\x00']) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000180)={&(0x7f0000000100)=[0x0, 0x0, r1, r2, r3, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x9, 0x1}) 20:24:43 executing program 1: r0 = socket(0x15, 0x6, 0x1f) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) (async) setregid(0x0, 0xee00) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) quotactl(0xffffffffffff114d, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)="7ee5dcc75cd16b0586ed60b741677c6f9a1f2c3d8f418a47942fa32fce2e02c6fabf57ce3625cdf6fb0f0772dcde8cb587ff3c78aef9e8e39d191a2c4b2c10a0948da0e3bbb17c7de093f9a6c981373f22a1100f0f26e7e8f3f972de52719092717b1fad51bd7f75c3d7aa33e944f89fdbc16da9d90a8cd8216f67bc57b8063121be063bbef3d943edab70c7846d98de1f22e2a29caebc97757731eb81b65f8fd0b1f7a9780e0e781e012a81b65f38b35d42a43e720a034c71795b897c36222ea9249c085ab5d8b786a67789f60e72a5e3f60347cad6edc9c1fa7e9c9fa21929cbfa60ac93a883908251f64ef7e8ab447e") openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40001) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x80240) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x4) 20:24:43 executing program 1: r0 = socket(0x15, 0x6, 0x1f) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) (async) setregid(0x0, 0xee00) 20:24:43 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r1 = socket(0x8, 0x2, 0x1) recvmsg$can_raw(r1, &(0x7f00000015c0)={&(0x7f0000000500)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x40) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setregid(r0, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/150, 0x96}], 0x1, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x12060) 20:24:43 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x1, 0x0, 0x1, 0x7, 0x9, 0x7, 0x100000001, 0x403}, &(0x7f0000000040)={0x0, 0x6, 0x4b, 0x4, 0x3, 0x25402c32, 0x3, 0x79}, &(0x7f0000000080)={0x1da, 0x74, 0x9, 0x9, 0x74, 0x1, 0x2, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000100)={[0x4]}, 0x8}) socket$rds(0x15, 0x5, 0x0) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) quotactl(0xffffffffffff114d, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)="7ee5dcc75cd16b0586ed60b741677c6f9a1f2c3d8f418a47942fa32fce2e02c6fabf57ce3625cdf6fb0f0772dcde8cb587ff3c78aef9e8e39d191a2c4b2c10a0948da0e3bbb17c7de093f9a6c981373f22a1100f0f26e7e8f3f972de52719092717b1fad51bd7f75c3d7aa33e944f89fdbc16da9d90a8cd8216f67bc57b8063121be063bbef3d943edab70c7846d98de1f22e2a29caebc97757731eb81b65f8fd0b1f7a9780e0e781e012a81b65f38b35d42a43e720a034c71795b897c36222ea9249c085ab5d8b786a67789f60e72a5e3f60347cad6edc9c1fa7e9c9fa21929cbfa60ac93a883908251f64ef7e8ab447e") (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40001) (async, rerun: 64) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x80240) (rerun: 64) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x4) 20:24:43 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) (async) r1 = socket(0x8, 0x2, 0x1) recvmsg$can_raw(r1, &(0x7f00000015c0)={&(0x7f0000000500)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x40) (async, rerun: 32) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) (rerun: 32) setregid(r0, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/150, 0x96}], 0x1, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x12060) 20:24:43 executing program 1: setregid(0xee00, 0xee00) 20:24:43 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x1, 0x0, 0x1, 0x7, 0x9, 0x7, 0x100000001, 0x403}, &(0x7f0000000040)={0x0, 0x6, 0x4b, 0x4, 0x3, 0x25402c32, 0x3, 0x79}, &(0x7f0000000080)={0x1da, 0x74, 0x9, 0x9, 0x74, 0x1, 0x2, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000100)={[0x4]}, 0x8}) socket$rds(0x15, 0x5, 0x0) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x1, 0x0, 0x1, 0x7, 0x9, 0x7, 0x100000001, 0x403}, &(0x7f0000000040)={0x0, 0x6, 0x4b, 0x4, 0x3, 0x25402c32, 0x3, 0x79}, &(0x7f0000000080)={0x1da, 0x74, 0x9, 0x9, 0x74, 0x1, 0x2, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000100)={[0x4]}, 0x8}) (async) socket$rds(0x15, 0x5, 0x0) (async) 20:24:43 executing program 1: setregid(0xee00, 0xee00) 20:24:43 executing program 3: set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x1, 0x0, 0x1, 0x7, 0x9, 0x7, 0x100000001, 0x403}, &(0x7f0000000040)={0x0, 0x6, 0x4b, 0x4, 0x3, 0x25402c32, 0x3, 0x79}, &(0x7f0000000080)={0x1da, 0x74, 0x9, 0x9, 0x74, 0x1, 0x2, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000100)={[0x4]}, 0x8}) (async) socket$rds(0x15, 0x5, 0x0) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) quotactl(0xffffffffffff114d, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)="7ee5dcc75cd16b0586ed60b741677c6f9a1f2c3d8f418a47942fa32fce2e02c6fabf57ce3625cdf6fb0f0772dcde8cb587ff3c78aef9e8e39d191a2c4b2c10a0948da0e3bbb17c7de093f9a6c981373f22a1100f0f26e7e8f3f972de52719092717b1fad51bd7f75c3d7aa33e944f89fdbc16da9d90a8cd8216f67bc57b8063121be063bbef3d943edab70c7846d98de1f22e2a29caebc97757731eb81b65f8fd0b1f7a9780e0e781e012a81b65f38b35d42a43e720a034c71795b897c36222ea9249c085ab5d8b786a67789f60e72a5e3f60347cad6edc9c1fa7e9c9fa21929cbfa60ac93a883908251f64ef7e8ab447e") (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x40001) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x80240) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x4) 20:24:43 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) (async) r1 = socket(0x8, 0x2, 0x1) recvmsg$can_raw(r1, &(0x7f00000015c0)={&(0x7f0000000500)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x40) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setregid(r0, r2) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/150, 0x96}], 0x1, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x12060) 20:24:43 executing program 1: setregid(0xee00, 0xee00) 20:24:43 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x3, 0x7}, 0x62}, 0x10) setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 20:24:43 executing program 3: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) r1 = socket(0x8, 0x2, 0x1) recvmsg$can_raw(r1, &(0x7f00000015c0)={&(0x7f0000000500)=@sco, 0x80, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1}, 0x40) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setregid(r0, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/150, 0x96}], 0x1, &(0x7f00000003c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x12060) 20:24:43 executing program 1: setregid(0x0, 0xee00) 20:24:43 executing program 1: setregid(0x0, 0xee00) setregid(0x0, 0xee00) (async) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95f, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:43 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x3, 0x7}, 0x62}, 0x10) setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 20:24:43 executing program 3: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:43 executing program 1: setregid(0x0, 0xee00) 20:24:43 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95f, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xa95f, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:43 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f00000000c0)={{0x3, 0x7}, 0x62}, 0x10) (async) setregid(0xee01, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 20:24:43 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4800, 0x20, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 20:24:43 executing program 3: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95f, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:44 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4800, 0x20, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4800, 0x20, &(0x7f0000000040)) (async) setregid(0x0, r0) (async) 20:24:44 executing program 3: set_mempolicy(0x1, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x604080) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000100)={[{@none}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@cpuset_v2_mode}], [{@flag='dirsync'}, {@seclabel}, {@permit_directio}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@flag='silent'}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) 20:24:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81b891735661b36a}, 0xc, &(0x7f0000000240)={&(0x7f00000010c0)=ANY=[@ANYBLOB="f93e6d0e", @ANYBLOB="48f7043ff98d7c393ad0edec17b1a313190eb1e6d5b0d8c7473c8df5ae82cbbfd13fbc06e9d42ad4aaa392832e610fc42b1260ead27cfa430e934420a045a0c1a3ff38c484b50588ccdc4c9573e391870ac9e785cf6be1855dece08dca1cb4ca05cf5248a33693bd", @ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB="08002c000900000008402c001f00000008000600", @ANYRESOCT=0x0, @ANYBLOB='\b\x002\x00\b\x00\x00\x00'], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x800) bind$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) setregid(0xffffffffffffffff, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @rose}, [@netrom, @null, @netrom, @rose, @rose, @rose, @rose, @default]}, &(0x7f0000000140)=0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x4004010) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000000)) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000040)=""/4096) statx(r4, &(0x7f0000000400)='./file0\x00', 0x400, 0x200, &(0x7f00000005c0)) 20:24:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81b891735661b36a}, 0xc, &(0x7f0000000240)={&(0x7f00000010c0)=ANY=[@ANYBLOB="f93e6d0e", @ANYBLOB="48f7043ff98d7c393ad0edec17b1a313190eb1e6d5b0d8c7473c8df5ae82cbbfd13fbc06e9d42ad4aaa392832e610fc42b1260ead27cfa430e934420a045a0c1a3ff38c484b50588ccdc4c9573e391870ac9e785cf6be1855dece08dca1cb4ca05cf5248a33693bd", @ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB="08002c000900000008402c001f00000008000600", @ANYRESOCT=0x0, @ANYBLOB='\b\x002\x00\b\x00\x00\x00'], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x800) (async) bind$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) setregid(0xffffffffffffffff, 0x0) (async, rerun: 64) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async, rerun: 64) getsockname$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @rose}, [@netrom, @null, @netrom, @rose, @rose, @rose, @rose, @default]}, &(0x7f0000000140)=0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x4004010) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000000)) (async, rerun: 64) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 64) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000040)=""/4096) (async) statx(r4, &(0x7f0000000400)='./file0\x00', 0x400, 0x200, &(0x7f00000005c0)) 20:24:44 executing program 3: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 1: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4800, 0x20, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 20:24:44 executing program 3: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x604080) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000100)={[{@none}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@cpuset_v2_mode}], [{@flag='dirsync'}, {@seclabel}, {@permit_directio}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@flag='silent'}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x604080) (async) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000100)={[{@none}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@cpuset_v2_mode}], [{@flag='dirsync'}, {@seclabel}, {@permit_directio}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@flag='silent'}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) (async) 20:24:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x81b891735661b36a}, 0xc, &(0x7f0000000240)={&(0x7f00000010c0)=ANY=[@ANYBLOB="f93e6d0e", @ANYBLOB="48f7043ff98d7c393ad0edec17b1a313190eb1e6d5b0d8c7473c8df5ae82cbbfd13fbc06e9d42ad4aaa392832e610fc42b1260ead27cfa430e934420a045a0c1a3ff38c484b50588ccdc4c9573e391870ac9e785cf6be1855dece08dca1cb4ca05cf5248a33693bd", @ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB="08002c000900000008402c001f00000008000600", @ANYRESOCT=0x0, @ANYBLOB='\b\x002\x00\b\x00\x00\x00'], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x800) (async) bind$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) (async) setregid(0xffffffffffffffff, 0x0) (async) r2 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) getsockname$ax25(0xffffffffffffffff, &(0x7f00000000c0)={{0x3, @rose}, [@netrom, @null, @netrom, @rose, @rose, @rose, @rose, @default]}, &(0x7f0000000140)=0x48) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x4004010) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r2, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000000)) r4 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000040)=""/4096) (async) statx(r4, &(0x7f0000000400)='./file0\x00', 0x400, 0x200, &(0x7f00000005c0)) 20:24:44 executing program 3: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x604080) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000100)={[{@none}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@cpuset_v2_mode}], [{@flag='dirsync'}, {@seclabel}, {@permit_directio}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@flag='silent'}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x604080) (async) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4, &(0x7f0000000100)={[{@none}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@noprefix}, {@cpuset_v2_mode}], [{@flag='dirsync'}, {@seclabel}, {@permit_directio}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@flag='silent'}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) (async) 20:24:44 executing program 3: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r0) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x4, 0x800, 0x0, 0x11}) 20:24:44 executing program 3: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f00000000c0)={&(0x7f0000000080), 0x4000000046, 0x0, 0x3}) setregid(0xee01, 0x0) 20:24:44 executing program 3: set_mempolicy(0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 20:24:44 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) (async, rerun: 32) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 32) setregid(r1, r0) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async, rerun: 64) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (rerun: 64) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x4, 0x800, 0x0, 0x11}) 20:24:44 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f00000000c0)={&(0x7f0000000080), 0x4000000046, 0x0, 0x3}) setregid(0xee01, 0x0) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f00000000c0)={&(0x7f0000000080), 0x4000000046, 0x0, 0x3}) (async) setregid(0xee01, 0x0) (async) 20:24:44 executing program 1: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r0) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x4, 0x800, 0x0, 0x11}) 20:24:44 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f00000000c0)={&(0x7f0000000080), 0x4000000046, 0x0, 0x3}) setregid(0xee01, 0x0) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000000)) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000040)={0x0, 0x1}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f00000000c0)={&(0x7f0000000080), 0x4000000046, 0x0, 0x3}) (async) setregid(0xee01, 0x0) (async) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50000101) 20:24:44 executing program 1: setregid(0x0, 0xee01) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50000101) 20:24:44 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x8d1, &(0x7f0000000100)) 20:24:44 executing program 1: setregid(0x0, 0xee01) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) setregid(0x0, 0xee01) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) (async) 20:24:44 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x8d1, &(0x7f0000000100)) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) (async) setregid(0xee01, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x8d1, &(0x7f0000000100)) (async) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50000101) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x50000101) (async) 20:24:44 executing program 1: setregid(0x0, 0xee01) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) 20:24:44 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) 20:24:44 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) (async) syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) (async) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) (async) setregid(0x0, 0xee01) (async) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x200001) 20:24:44 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x8d1, &(0x7f0000000100)) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) (async) setregid(0xee01, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x1000, 0x8d1, &(0x7f0000000100)) (async) 20:24:44 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) (async) syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) (async) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) (async) setregid(0x0, 0xee01) (async) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x200001) 20:24:44 executing program 1: r0 = getegid() setregid(r0, 0xffffffffffffffff) 20:24:44 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x200001) 20:24:44 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) r0 = socket(0x2, 0x6, 0x1f6) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0x4) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x1, '`'}, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000180)) 20:24:44 executing program 1: r0 = getegid() setregid(r0, 0xffffffffffffffff) 20:24:44 executing program 4: setregid(0xee01, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x240050, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@context={'context', 0x3d, 'root'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r0}], {0x10, 0x3}, {0x20, 0x1}}, 0x3c, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) 20:24:44 executing program 1: r0 = getegid() setregid(r0, 0xffffffffffffffff) 20:24:44 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) r0 = socket(0x2, 0x6, 0x1f6) (async) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0x4) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x1, '`'}, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) (rerun: 32) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000180)) 20:24:44 executing program 2: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) (async) r0 = socket(0x2, 0x6, 0x1f6) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0x4) (async) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x1, '`'}, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000180)) 20:24:44 executing program 1: setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000000), 0x4) setregid(0x0, 0xee01) sendmsg$rds(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002240)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/216, 0xd8}, {&(0x7f0000002180)=""/177, 0xb1}], 0x4, &(0x7f0000003800)=[@rdma_args={0x48, 0x114, 0x1, {{0x8, 0x7}, {&(0x7f0000002280)=""/4096, 0x1000}, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/161, 0xa1}, {&(0x7f0000003340)=""/38, 0x26}, {&(0x7f0000003380)=""/9, 0x9}], 0x3, 0x20, 0x5000000000000000}}, @rdma_map={0x30, 0x114, 0x3, {{0xffffffffffffffff}, &(0x7f0000003400), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x2}, &(0x7f0000003440)=0xffffffffffffffc1, &(0x7f0000003480)=0x3ed, 0x100000000, 0x9, 0x2, 0xff, 0x2, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000034c0)=""/131, 0x83}, &(0x7f0000003580), 0x41}}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x4}, &(0x7f00000035c0)=0x1, &(0x7f0000003600)=0xfffffffffffffc01, 0x7, 0x3, 0x8, 0x3, 0xa, 0xffffffffffffc6f4}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x5}, &(0x7f0000003640)=0x7fffffff, &(0x7f0000003680)=0x2, 0x803, 0xffffffff, 0x1, 0x945, 0x41, 0x200}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @fadd={0x58, 0x114, 0x6, {{0x81, 0xfffffffc}, &(0x7f00000036c0)=0x5, &(0x7f0000003700), 0x6, 0x7ff, 0x7, 0x2, 0x21, 0x1f}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003740)=""/75, 0x4b}, &(0x7f00000037c0)}}], 0x250, 0x40000}, 0x8042) setregid(0x0, 0xffffffffffffffff) 20:24:44 executing program 4: setregid(0xee01, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x240050, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@context={'context', 0x3d, 'root'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r0}], {0x10, 0x3}, {0x20, 0x1}}, 0x3c, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) setregid(0xee01, 0x0) (async) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x240050, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@context={'context', 0x3d, 'root'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) (async) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) (async) setxattr$system_posix_acl(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r0}], {0x10, 0x3}, {0x20, 0x1}}, 0x3c, 0x3) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x0) (async) setregid(r1, 0x0) (async) 20:24:44 executing program 1: setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000000), 0x4) setregid(0x0, 0xee01) sendmsg$rds(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002240)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/216, 0xd8}, {&(0x7f0000002180)=""/177, 0xb1}], 0x4, &(0x7f0000003800)=[@rdma_args={0x48, 0x114, 0x1, {{0x8, 0x7}, {&(0x7f0000002280)=""/4096, 0x1000}, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/161, 0xa1}, {&(0x7f0000003340)=""/38, 0x26}, {&(0x7f0000003380)=""/9, 0x9}], 0x3, 0x20, 0x5000000000000000}}, @rdma_map={0x30, 0x114, 0x3, {{0xffffffffffffffff}, &(0x7f0000003400), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x2}, &(0x7f0000003440)=0xffffffffffffffc1, &(0x7f0000003480)=0x3ed, 0x100000000, 0x9, 0x2, 0xff, 0x2, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000034c0)=""/131, 0x83}, &(0x7f0000003580), 0x41}}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x4}, &(0x7f00000035c0)=0x1, &(0x7f0000003600)=0xfffffffffffffc01, 0x7, 0x3, 0x8, 0x3, 0xa, 0xffffffffffffc6f4}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x5}, &(0x7f0000003640)=0x7fffffff, &(0x7f0000003680)=0x2, 0x803, 0xffffffff, 0x1, 0x945, 0x41, 0x200}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @fadd={0x58, 0x114, 0x6, {{0x81, 0xfffffffc}, &(0x7f00000036c0)=0x5, &(0x7f0000003700), 0x6, 0x7ff, 0x7, 0x2, 0x21, 0x1f}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003740)=""/75, 0x4b}, &(0x7f00000037c0)}}], 0x250, 0x40000}, 0x8042) setregid(0x0, 0xffffffffffffffff) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000000), 0x4) (async) setregid(0x0, 0xee01) (async) sendmsg$rds(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002240)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/216, 0xd8}, {&(0x7f0000002180)=""/177, 0xb1}], 0x4, &(0x7f0000003800)=[@rdma_args={0x48, 0x114, 0x1, {{0x8, 0x7}, {&(0x7f0000002280)=""/4096, 0x1000}, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/161, 0xa1}, {&(0x7f0000003340)=""/38, 0x26}, {&(0x7f0000003380)=""/9, 0x9}], 0x3, 0x20, 0x5000000000000000}}, @rdma_map={0x30, 0x114, 0x3, {{0xffffffffffffffff}, &(0x7f0000003400), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x2}, &(0x7f0000003440)=0xffffffffffffffc1, &(0x7f0000003480)=0x3ed, 0x100000000, 0x9, 0x2, 0xff, 0x2, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000034c0)=""/131, 0x83}, &(0x7f0000003580), 0x41}}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x4}, &(0x7f00000035c0)=0x1, &(0x7f0000003600)=0xfffffffffffffc01, 0x7, 0x3, 0x8, 0x3, 0xa, 0xffffffffffffc6f4}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x5}, &(0x7f0000003640)=0x7fffffff, &(0x7f0000003680)=0x2, 0x803, 0xffffffff, 0x1, 0x945, 0x41, 0x200}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @fadd={0x58, 0x114, 0x6, {{0x81, 0xfffffffc}, &(0x7f00000036c0)=0x5, &(0x7f0000003700), 0x6, 0x7ff, 0x7, 0x2, 0x21, 0x1f}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003740)=""/75, 0x4b}, &(0x7f00000037c0)}}], 0x250, 0x40000}, 0x8042) (async) setregid(0x0, 0xffffffffffffffff) (async) 20:24:44 executing program 2: set_mempolicy(0x4000, &(0x7f0000000000)=0xa95b, 0x7) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x77ef9) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4000, 0x80, &(0x7f00000002c0)) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000040), &(0x7f00000000c0)=[{}, {{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f00000001c0)}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:44 executing program 4: setregid(0xee01, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x240050, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@context={'context', 0x3d, 'root'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r0}], {0x10, 0x3}, {0x20, 0x1}}, 0x3c, 0x3) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) setregid(0xee01, 0x0) (async) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x240050, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@timeout={'timeout', 0x3d, 0x4}}], [{@context={'context', 0x3d, 'root'}}, {@obj_type}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}}) (async) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) (async) setxattr$system_posix_acl(&(0x7f0000000100)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, 0xee00}, {0x2, 0x5, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r0}], {0x10, 0x3}, {0x20, 0x1}}, 0x3c, 0x3) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x0) (async) setregid(r1, 0x0) (async) 20:24:44 executing program 1: setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000000), 0x4) (async) setregid(0x0, 0xee01) sendmsg$rds(0xffffffffffffffff, &(0x7f0000003a80)={&(0x7f0000000040)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000002240)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/216, 0xd8}, {&(0x7f0000002180)=""/177, 0xb1}], 0x4, &(0x7f0000003800)=[@rdma_args={0x48, 0x114, 0x1, {{0x8, 0x7}, {&(0x7f0000002280)=""/4096, 0x1000}, &(0x7f00000033c0)=[{&(0x7f0000003280)=""/161, 0xa1}, {&(0x7f0000003340)=""/38, 0x26}, {&(0x7f0000003380)=""/9, 0x9}], 0x3, 0x20, 0x5000000000000000}}, @rdma_map={0x30, 0x114, 0x3, {{0xffffffffffffffff}, &(0x7f0000003400), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x2}, &(0x7f0000003440)=0xffffffffffffffc1, &(0x7f0000003480)=0x3ed, 0x100000000, 0x9, 0x2, 0xff, 0x2, 0x9}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000034c0)=""/131, 0x83}, &(0x7f0000003580), 0x41}}, @mask_cswp={0x58, 0x114, 0x9, {{0x9, 0x4}, &(0x7f00000035c0)=0x1, &(0x7f0000003600)=0xfffffffffffffc01, 0x7, 0x3, 0x8, 0x3, 0xa, 0xffffffffffffc6f4}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x5}, &(0x7f0000003640)=0x7fffffff, &(0x7f0000003680)=0x2, 0x803, 0xffffffff, 0x1, 0x945, 0x41, 0x200}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}, @fadd={0x58, 0x114, 0x6, {{0x81, 0xfffffffc}, &(0x7f00000036c0)=0x5, &(0x7f0000003700), 0x6, 0x7ff, 0x7, 0x2, 0x21, 0x1f}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003740)=""/75, 0x4b}, &(0x7f00000037c0)}}], 0x250, 0x40000}, 0x8042) (async) setregid(0x0, 0xffffffffffffffff) 20:24:44 executing program 2: set_mempolicy(0x4000, &(0x7f0000000000)=0xa95b, 0x7) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x77ef9) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4000, 0x80, &(0x7f00000002c0)) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000040), &(0x7f00000000c0)=[{}, {{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f00000001c0)}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xa95b, 0x7) (async) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x77ef9) (async) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4000, 0x80, &(0x7f00000002c0)) (async) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000040), &(0x7f00000000c0)}) (async) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f00000001c0)}) (async) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:44 executing program 2: set_mempolicy(0x4000, &(0x7f0000000000)=0xa95b, 0x7) (async) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x77ef9) (async) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4000, 0x80, &(0x7f00000002c0)) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000040), &(0x7f00000000c0)=[{}, {{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f00000001c0)}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:44 executing program 4: setregid(0xee01, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40000, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000009,rw,hash,\x00']) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="63ca0f3a0125b66af35d6e985e8fa254ed7e4881b326a45facca7c72914c06e6a1c8", 0x22, 0x1, 0x0, 0x0) 20:24:44 executing program 1: setregid(0x0, 0xee01) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) mount$9p_rdma(&(0x7f00000002c0), &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x900040, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@version_9p2000}, {@timeout={'timeout', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0xff}}, {@common=@nodevmap}, {@rq={'rq', 0x3d, 0xab}}, {@sq={'sq', 0x3d, 0xffffffff}}], [{@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}'}}]}}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x21, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@flag='rw'}]}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'tunl0\x00', r1, 0x700, 0x700, 0xff, 0x8, {{0x9, 0x4, 0x0, 0x9, 0x24, 0x64, 0x0, 0x20, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x10, 0x15, 0x0, 0x3, [0x7f, 0x1, 0x3939]}]}}}}}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x40, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) r2 = syz_open_dev$dri(&(0x7f0000000640), 0x1, 0x100) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000680)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000006c0)={r3}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) 20:24:44 executing program 4: setregid(0xee01, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40000, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d5f7424717a080b2eee8a81dff3d16e8b910c4425e2fa0b67bb4f2c35adcc5739c55d7701b8c781f88e323a26d2b87b7ea502dee0dd649f9cd93b4b9c64e17e11e95624a0d8958d7eae43804cf5b5f88b821d999f12b4cfb9e34c08787a6f78e21db205e5504a4f68e8daab16c20198adfd74cebcfba89245706d472b9c3d513e7883732525676a6c2eb80726056b48582af55ad8749b31d976dc4e07a8c87e2ced28628a4ab382fcdb565e36ebeb59dcc2c97c8d76d58d83ddf5d966cf5643fe4abfbe4572648c1a1a5cf83975215d7b658ac1ee18bb7821a06d5f68dfc08160fd9b069fd5df796acf31b68ebf82aa57da96aa9a09e810e3ec84f2813648df", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000009,rw,hash,\x00']) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="63ca0f3a0125b66af35d6e985e8fa254ed7e4881b326a45facca7c72914c06e6a1c8", 0x22, 0x1, 0x0, 0x0) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f00000000c0)=0x80000000, 0xeb) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x40800, &(0x7f0000000180)={[{@subsystem='cpuset'}, {@xattr}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/snd/timer\x00'}}]}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) 20:24:45 executing program 1: setregid(0x0, 0xee01) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) mount$9p_rdma(&(0x7f00000002c0), &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x900040, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@version_9p2000}, {@timeout={'timeout', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0xff}}, {@common=@nodevmap}, {@rq={'rq', 0x3d, 0xab}}, {@sq={'sq', 0x3d, 0xffffffff}}], [{@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}'}}]}}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x21, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@flag='rw'}]}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'tunl0\x00', r1, 0x700, 0x700, 0xff, 0x8, {{0x9, 0x4, 0x0, 0x9, 0x24, 0x64, 0x0, 0x20, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x10, 0x15, 0x0, 0x3, [0x7f, 0x1, 0x3939]}]}}}}}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x40, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) r2 = syz_open_dev$dri(&(0x7f0000000640), 0x1, 0x100) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000680)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000006c0)={r3}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) setregid(0x0, 0xee01) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) mount$9p_rdma(&(0x7f00000002c0), &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x900040, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@version_9p2000}, {@timeout={'timeout', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0xff}}, {@common=@nodevmap}, {@rq={'rq', 0x3d, 0xab}}, {@sq={'sq', 0x3d, 0xffffffff}}], [{@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}'}}]}}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x21, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@flag='rw'}]}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'tunl0\x00', r1, 0x700, 0x700, 0xff, 0x8, {{0x9, 0x4, 0x0, 0x9, 0x24, 0x64, 0x0, 0x20, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x10, 0x15, 0x0, 0x3, [0x7f, 0x1, 0x3939]}]}}}}}) (async) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x40, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) (async) syz_open_dev$dri(&(0x7f0000000640), 0x1, 0x100) (async) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000680)) (async) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000006c0)={r3}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) 20:24:45 executing program 4: setregid(0xee01, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x40000, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000009,rw,hash,\x00']) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="63ca0f3a0125b66af35d6e985e8fa254ed7e4881b326a45facca7c72914c06e6a1c8", 0x22, 0x1, 0x0, 0x0) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x0, &(0x7f00000000c0)=0x80000000, 0xeb) (async) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x40800, &(0x7f0000000180)={[{@subsystem='cpuset'}, {@xattr}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/snd/timer\x00'}}]}) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) mount$9p_rdma(&(0x7f00000002c0), &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x900040, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@version_9p2000}, {@timeout={'timeout', 0x3d, 0x5}}, {@sq={'sq', 0x3d, 0xff}}, {@common=@nodevmap}, {@rq={'rq', 0x3d, 0xab}}, {@sq={'sq', 0x3d, 0xffffffff}}], [{@context={'context', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '}'}}]}}) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x21, &(0x7f0000000380)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@flag='rw'}]}}) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'batadv_slave_0\x00', 0x0}) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'tunl0\x00', r1, 0x700, 0x700, 0xff, 0x8, {{0x9, 0x4, 0x0, 0x9, 0x24, 0x64, 0x0, 0x20, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x10, 0x15, 0x0, 0x3, [0x7f, 0x1, 0x3939]}]}}}}}) (async, rerun: 64) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) (rerun: 64) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240), 0x40, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) r2 = syz_open_dev$dri(&(0x7f0000000640), 0x1, 0x100) (async) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000680)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000006c0)={r3}) (async, rerun: 64) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (rerun: 64) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x0, &(0x7f00000000c0)=0x80000000, 0xeb) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x40800, &(0x7f0000000180)={[{@subsystem='cpuset'}, {@xattr}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/snd/timer\x00'}}]}) (async, rerun: 32) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async, rerun: 32) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000040)) 20:24:45 executing program 4: setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000640)={&(0x7f0000000280)=[0x7, 0xea, 0x2, 0x401, 0x0, 0x6, 0x4, 0x4], 0x8, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x400, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x6}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee00}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x1, r1}], {0x4, 0x5}, [{0x8, 0x2, r2}, {0x8, 0x3, r3}], {0x10, 0x2}}, 0x5c, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:45 executing program 4: setregid(0xee01, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000640)={&(0x7f0000000280)=[0x7, 0xea, 0x2, 0x401, 0x0, 0x6, 0x4, 0x4], 0x8, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x400, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x6}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee00}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x1, r1}], {0x4, 0x5}, [{0x8, 0x2, r2}, {0x8, 0x3, r3}], {0x10, 0x2}}, 0x5c, 0x1) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x3080400, &(0x7f0000000100)={[{@none}, {@none}, {@noprefix}, {}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@name={'name', 0x3d, ')\''}}, {@clone_children}]}) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @bcast}, [@netrom, @default, @rose, @null, @remote, @rose, @default, @null]}, &(0x7f0000000200)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x2, 0x4) 20:24:45 executing program 4: setregid(0xee01, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000640)={&(0x7f0000000280)=[0x7, 0xea, 0x2, 0x401, 0x0, 0x6, 0x4, 0x4], 0x8, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x400, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000340)={{}, {0x1, 0x6}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee00}, {0x2, 0x1, 0xffffffffffffffff}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x1, r1}], {0x4, 0x5}, [{0x8, 0x2, r2}, {0x8, 0x3, r3}], {0x10, 0x2}}, 0x5c, 0x1) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:45 executing program 1: setregid(0x0, 0xee01) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setgid(r0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x3080400, &(0x7f0000000100)={[{@none}, {@none}, {@noprefix}, {}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@name={'name', 0x3d, ')\''}}, {@clone_children}]}) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @bcast}, [@netrom, @default, @rose, @null, @remote, @rose, @default, @null]}, &(0x7f0000000200)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x2, 0x4) set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x3080400, &(0x7f0000000100)={[{@none}, {@none}, {@noprefix}, {}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@name={'name', 0x3d, ')\''}}, {@clone_children}]}) (async) accept$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @bcast}, [@netrom, @default, @rose, @null, @remote, @rose, @default, @null]}, &(0x7f0000000200)=0x48) (async) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x2, 0x4) (async) 20:24:45 executing program 4: setregid(0xee01, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000040)=""/5, 0x5}) 20:24:45 executing program 1: setregid(0x0, 0xee01) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setgid(r0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) setregid(0x0, 0xee01) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000) (async) setgid(r0) (async) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) (async) 20:24:45 executing program 4: setregid(0xee01, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000040)=""/5, 0x5}) setregid(0xee01, 0x0) (async) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000040)=""/5, 0x5}) (async) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async, rerun: 64) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x3080400, &(0x7f0000000100)={[{@none}, {@none}, {@noprefix}, {}, {@release_agent={'release_agent', 0x3d, './file0'}}, {@none}, {@name={'name', 0x3d, ')\''}}, {@clone_children}]}) (rerun: 64) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @bcast}, [@netrom, @default, @rose, @null, @remote, @rose, @default, @null]}, &(0x7f0000000200)=0x48) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, &(0x7f0000000240)=0x2, 0x4) 20:24:45 executing program 4: setregid(0xee01, 0x0) (async) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000), &(0x7f0000000040)=""/5, 0x5}) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setgid(r0) (async, rerun: 32) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) (rerun: 32) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x2, &(0x7f0000000040)=0x200, 0x1) set_mempolicy(0x0, &(0x7f00000000c0)=0x3, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:45 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) setregid(0xee01, 0x0) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x2, &(0x7f0000000040)=0x200, 0x1) set_mempolicy(0x0, &(0x7f00000000c0)=0x3, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x2, &(0x7f0000000040)=0x200, 0x1) (async) set_mempolicy(0x0, &(0x7f00000000c0)=0x3, 0x2) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) clock_gettime(0x0, &(0x7f00000036c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000003540)=[{{&(0x7f00000000c0), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)=""/209, 0xd1}], 0x1}}, {{&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000300)=""/145, 0x91}, {&(0x7f00000003c0)=""/156, 0x9c}], 0x2, &(0x7f00000004c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000680)=""/23, 0x17}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/250, 0xfa}, {&(0x7f0000001880)=""/32, 0x20}, {&(0x7f00000018c0)=""/130, 0x82}, {&(0x7f0000001980)=""/108, 0x6c}, {&(0x7f0000001a00)=""/171, 0xab}], 0x8}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001b40)=""/197, 0xc5}, {&(0x7f0000001c40)=""/26, 0x1a}, {&(0x7f0000001c80)=""/63, 0x3f}, {&(0x7f0000001cc0)=""/96, 0x60}, {&(0x7f0000001d40)=""/4096, 0x1000}], 0x5, &(0x7f0000002dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000002ec0), 0x6e, &(0x7f0000003040)=[{&(0x7f0000002f40)=""/209, 0xd1}], 0x1, &(0x7f0000003080)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000003100), 0x6e, &(0x7f0000003480)=[{&(0x7f0000003180)=""/106, 0x6a}, {&(0x7f0000003200)=""/254, 0xfe}, {&(0x7f0000003300)=""/17, 0x11}, {&(0x7f0000003340)=""/108, 0x6c}, {&(0x7f00000033c0)=""/158, 0x9e}], 0x5, &(0x7f0000003500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}], 0x6, 0x163, &(0x7f0000003700)={r1, r2+10000000}) 20:24:45 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) setregid(0xee01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) (async) setregid(0xee01, 0x0) (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) (async) clock_gettime(0x0, &(0x7f00000036c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000003540)=[{{&(0x7f00000000c0), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)=""/209, 0xd1}], 0x1}}, {{&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000300)=""/145, 0x91}, {&(0x7f00000003c0)=""/156, 0x9c}], 0x2, &(0x7f00000004c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000680)=""/23, 0x17}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/250, 0xfa}, {&(0x7f0000001880)=""/32, 0x20}, {&(0x7f00000018c0)=""/130, 0x82}, {&(0x7f0000001980)=""/108, 0x6c}, {&(0x7f0000001a00)=""/171, 0xab}], 0x8}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001b40)=""/197, 0xc5}, {&(0x7f0000001c40)=""/26, 0x1a}, {&(0x7f0000001c80)=""/63, 0x3f}, {&(0x7f0000001cc0)=""/96, 0x60}, {&(0x7f0000001d40)=""/4096, 0x1000}], 0x5, &(0x7f0000002dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000002ec0), 0x6e, &(0x7f0000003040)=[{&(0x7f0000002f40)=""/209, 0xd1}], 0x1, &(0x7f0000003080)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000003100), 0x6e, &(0x7f0000003480)=[{&(0x7f0000003180)=""/106, 0x6a}, {&(0x7f0000003200)=""/254, 0xfe}, {&(0x7f0000003300)=""/17, 0x11}, {&(0x7f0000003340)=""/108, 0x6c}, {&(0x7f00000033c0)=""/158, 0x9e}], 0x5, &(0x7f0000003500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}], 0x6, 0x163, &(0x7f0000003700)={r1, r2+10000000}) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x2, &(0x7f0000000040)=0x200, 0x1) set_mempolicy(0x0, &(0x7f00000000c0)=0x3, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x2, &(0x7f0000000040)=0x200, 0x1) (async) set_mempolicy(0x0, &(0x7f00000000c0)=0x3, 0x2) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:45 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) setregid(0xee01, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00'}) (async) setregid(0xee01, 0x0) (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) (async) clock_gettime(0x0, &(0x7f00000036c0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000003540)=[{{&(0x7f00000000c0), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)=""/209, 0xd1}], 0x1}}, {{&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000300)=""/145, 0x91}, {&(0x7f00000003c0)=""/156, 0x9c}], 0x2, &(0x7f00000004c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x138}}, {{&(0x7f0000000600), 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000680)=""/23, 0x17}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/250, 0xfa}, {&(0x7f0000001880)=""/32, 0x20}, {&(0x7f00000018c0)=""/130, 0x82}, {&(0x7f0000001980)=""/108, 0x6c}, {&(0x7f0000001a00)=""/171, 0xab}], 0x8}}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001b40)=""/197, 0xc5}, {&(0x7f0000001c40)=""/26, 0x1a}, {&(0x7f0000001c80)=""/63, 0x3f}, {&(0x7f0000001cc0)=""/96, 0x60}, {&(0x7f0000001d40)=""/4096, 0x1000}], 0x5, &(0x7f0000002dc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000002ec0), 0x6e, &(0x7f0000003040)=[{&(0x7f0000002f40)=""/209, 0xd1}], 0x1, &(0x7f0000003080)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000003100), 0x6e, &(0x7f0000003480)=[{&(0x7f0000003180)=""/106, 0x6a}, {&(0x7f0000003200)=""/254, 0xfe}, {&(0x7f0000003300)=""/17, 0x11}, {&(0x7f0000003340)=""/108, 0x6c}, {&(0x7f00000033c0)=""/158, 0x9e}], 0x5, &(0x7f0000003500)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}], 0x6, 0x163, &(0x7f0000003700)={r1, r2+10000000}) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x2, 0xacf, 0x5, 0x2], 0x5, 0x0, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\t\x00/file0\x00\x00\x00\x00\x00\x00\x00\x00']) 20:24:45 executing program 4: setregid(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x7) quotactl(0x9, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)="c6c227429934c97bf4e4b15097c553a39270c6455122d6623b25c8f423a3f102a1b1b7062a214f193e90edb9d8121ef425f2fb275e1734429b19867c446d5900f788449dbf364593fcdfe4c6baf37f0bf65ce1403e9f177ce3bb34b16a9f3b12fc54578044591cbac86e4f4ff48090af5d06363409b2b0ecc79e2c6c85988fad16951c889871178ebe0c908c00dca754830b74e678bb6c660401fd26e5ff89a52e773ed8f81d4971229ea9a9abb3ca47f4f9bb40f90e8d") 20:24:45 executing program 1: setregid(0x0, 0xee01) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)=""/146, 0x92}], 0x1, &(0x7f0000000180)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000240), 0x6e, &(0x7f0000001680)=[{&(0x7f00000002c0)=""/174, 0xae}, {&(0x7f0000000380)=""/238, 0xee}, {&(0x7f0000000480)=""/110, 0x6e}, {&(0x7f0000000500)=""/1, 0x1}, {&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/6, 0x6}], 0x9}}, {{&(0x7f0000001740)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000017c0)=""/83, 0x53}, {&(0x7f0000001840)=""/68, 0x44}], 0x2}}, {{&(0x7f0000001900), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001980)=""/141, 0x8d}], 0x1, &(0x7f0000001a80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b40)=""/180, 0xb4}], 0x1, &(0x7f0000001c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001d40)=""/84, 0x54}, {&(0x7f0000001dc0)=""/143, 0x8f}], 0x2, &(0x7f0000001ec0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001f00), 0x6e, &(0x7f0000002340)=[{&(0x7f0000001f80)=""/194, 0xc2}, {&(0x7f0000002080)=""/59, 0x3b}, {&(0x7f00000020c0)=""/244, 0xf4}, {&(0x7f00000021c0)=""/101, 0x65}, {&(0x7f0000002240)=""/250, 0xfa}], 0x5, &(0x7f00000023c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}], 0x7, 0x1, &(0x7f0000002680)) getegid() 20:24:45 executing program 4: setregid(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x7) quotactl(0x9, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)="c6c227429934c97bf4e4b15097c553a39270c6455122d6623b25c8f423a3f102a1b1b7062a214f193e90edb9d8121ef425f2fb275e1734429b19867c446d5900f788449dbf364593fcdfe4c6baf37f0bf65ce1403e9f177ce3bb34b16a9f3b12fc54578044591cbac86e4f4ff48090af5d06363409b2b0ecc79e2c6c85988fad16951c889871178ebe0c908c00dca754830b74e678bb6c660401fd26e5ff89a52e773ed8f81d4971229ea9a9abb3ca47f4f9bb40f90e8d") 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)=""/146, 0x92}], 0x1, &(0x7f0000000180)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000240), 0x6e, &(0x7f0000001680)=[{&(0x7f00000002c0)=""/174, 0xae}, {&(0x7f0000000380)=""/238, 0xee}, {&(0x7f0000000480)=""/110, 0x6e}, {&(0x7f0000000500)=""/1, 0x1}, {&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/6, 0x6}], 0x9}}, {{&(0x7f0000001740)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000017c0)=""/83, 0x53}, {&(0x7f0000001840)=""/68, 0x44}], 0x2}}, {{&(0x7f0000001900), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001980)=""/141, 0x8d}], 0x1, &(0x7f0000001a80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b40)=""/180, 0xb4}], 0x1, &(0x7f0000001c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001d40)=""/84, 0x54}, {&(0x7f0000001dc0)=""/143, 0x8f}], 0x2, &(0x7f0000001ec0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001f00), 0x6e, &(0x7f0000002340)=[{&(0x7f0000001f80)=""/194, 0xc2}, {&(0x7f0000002080)=""/59, 0x3b}, {&(0x7f00000020c0)=""/244, 0xf4}, {&(0x7f00000021c0)=""/101, 0x65}, {&(0x7f0000002240)=""/250, 0xfa}], 0x5, &(0x7f00000023c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}], 0x7, 0x1, &(0x7f0000002680)) (async) getegid() 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x2, 0xacf, 0x5, 0x2], 0x5, 0x0, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\t\x00/file0\x00\x00\x00\x00\x00\x00\x00\x00']) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x2, 0xacf, 0x5, 0x2], 0x5}) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\t\x00/file0\x00\x00\x00\x00\x00\x00\x00\x00']) (async) 20:24:45 executing program 4: setregid(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x7) quotactl(0x9, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)="c6c227429934c97bf4e4b15097c553a39270c6455122d6623b25c8f423a3f102a1b1b7062a214f193e90edb9d8121ef425f2fb275e1734429b19867c446d5900f788449dbf364593fcdfe4c6baf37f0bf65ce1403e9f177ce3bb34b16a9f3b12fc54578044591cbac86e4f4ff48090af5d06363409b2b0ecc79e2c6c85988fad16951c889871178ebe0c908c00dca754830b74e678bb6c660401fd26e5ff89a52e773ed8f81d4971229ea9a9abb3ca47f4f9bb40f90e8d") setregid(0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x7) (async) quotactl(0x9, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)="c6c227429934c97bf4e4b15097c553a39270c6455122d6623b25c8f423a3f102a1b1b7062a214f193e90edb9d8121ef425f2fb275e1734429b19867c446d5900f788449dbf364593fcdfe4c6baf37f0bf65ce1403e9f177ce3bb34b16a9f3b12fc54578044591cbac86e4f4ff48090af5d06363409b2b0ecc79e2c6c85988fad16951c889871178ebe0c908c00dca754830b74e678bb6c660401fd26e5ff89a52e773ed8f81d4971229ea9a9abb3ca47f4f9bb40f90e8d") (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000024c0)=[{{&(0x7f0000000000), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)=""/146, 0x92}], 0x1, &(0x7f0000000180)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000240), 0x6e, &(0x7f0000001680)=[{&(0x7f00000002c0)=""/174, 0xae}, {&(0x7f0000000380)=""/238, 0xee}, {&(0x7f0000000480)=""/110, 0x6e}, {&(0x7f0000000500)=""/1, 0x1}, {&(0x7f0000000540)=""/23, 0x17}, {&(0x7f0000000580)=""/93, 0x5d}, {&(0x7f0000000600)=""/26, 0x1a}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/6, 0x6}], 0x9}}, {{&(0x7f0000001740)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000017c0)=""/83, 0x53}, {&(0x7f0000001840)=""/68, 0x44}], 0x2}}, {{&(0x7f0000001900), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001980)=""/141, 0x8d}], 0x1, &(0x7f0000001a80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b40)=""/180, 0xb4}], 0x1, &(0x7f0000001c40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001d40)=""/84, 0x54}, {&(0x7f0000001dc0)=""/143, 0x8f}], 0x2, &(0x7f0000001ec0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000001f00), 0x6e, &(0x7f0000002340)=[{&(0x7f0000001f80)=""/194, 0xc2}, {&(0x7f0000002080)=""/59, 0x3b}, {&(0x7f00000020c0)=""/244, 0xf4}, {&(0x7f00000021c0)=""/101, 0x65}, {&(0x7f0000002240)=""/250, 0xfa}], 0x5, &(0x7f00000023c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}], 0x7, 0x1, &(0x7f0000002680)) getegid() 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x2, 0xacf, 0x5, 0x2], 0x5, 0x0, 0x0, 0xffffffffffffffff}) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\t\x00/file0\x00\x00\x00\x00\x00\x00\x00\x00']) 20:24:45 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000000) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x108) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000001040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) accept$nfc_llcp(r0, &(0x7f00000010c0), &(0x7f0000001140)=0x60) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000001080)) 20:24:45 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x24) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000010c0)={&(0x7f0000001080)=[0x4, 0x8000, 0x4c5, 0x10001, 0x0, 0x6, 0x6], 0x7, 0x80000}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) setregid(0xee01, 0x0) setxattr$incfs_id(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001040)=0x6482, 0x4) setregid(0xee00, 0xee00) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x313d82) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000000000000100"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x140}, 0x10002) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000001340)) 20:24:45 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000000) (async) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x108) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000001040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) accept$nfc_llcp(r0, &(0x7f00000010c0), &(0x7f0000001140)=0x60) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000001080)) 20:24:45 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x24) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000010c0)={&(0x7f0000001080)=[0x4, 0x8000, 0x4c5, 0x10001, 0x0, 0x6, 0x6], 0x7, 0x80000}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) setregid(0xee01, 0x0) setxattr$incfs_id(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001040)=0x6482, 0x4) setregid(0xee00, 0xee00) openat(0xffffffffffffffff, 0x0, 0x0, 0x24) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000010c0)={&(0x7f0000001080)=[0x4, 0x8000, 0x4c5, 0x10001, 0x0, 0x6, 0x6], 0x7, 0x80000}) (async) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) (async) setregid(0xee01, 0x0) (async) setxattr$incfs_id(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) (async) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001040)=0x6482, 0x4) (async) setregid(0xee00, 0xee00) (async) 20:24:45 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000000) (async) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x108) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000001040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) accept$nfc_llcp(r0, &(0x7f00000010c0), &(0x7f0000001140)=0x60) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000001080)) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x313d82) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000000000000100"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x140}, 0x10002) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000001340)) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x313d82) (async) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000000000000100"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x140}, 0x10002) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000001340)) (async) 20:24:45 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x24) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000010c0)={&(0x7f0000001080)=[0x4, 0x8000, 0x4c5, 0x10001, 0x0, 0x6, 0x6], 0x7, 0x80000}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) setregid(0xee01, 0x0) setxattr$incfs_id(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001040)=0x6482, 0x4) setregid(0xee00, 0xee00) openat(0xffffffffffffffff, 0x0, 0x0, 0x24) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000010c0)={&(0x7f0000001080)=[0x4, 0x8000, 0x4c5, 0x10001, 0x0, 0x6, 0x6], 0x7, 0x80000}) (async) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) (async) setregid(0xee01, 0x0) (async) setxattr$incfs_id(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140), &(0x7f0000001180)={'0000000000000000000000000000000', 0x30}, 0x20, 0x0) (async) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000001040)=0x6482, 0x4) (async) setregid(0xee00, 0xee00) (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) setgid(0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000008, 0x2010, 0xffffffffffffffff, 0x579) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) 20:24:45 executing program 4: setregid(0xee01, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x313d82) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000000100)=""/69, 0x45}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000000000000100"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x140}, 0x10002) (async) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000001340)) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) setgid(0xffffffffffffffff) (async) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000008, 0x2010, 0xffffffffffffffff, 0x579) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) 20:24:45 executing program 4: setregid(0xee01, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 20:24:45 executing program 4: setregid(0xee01, 0x0) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x100) 20:24:45 executing program 1: setregid(0x0, 0xee01) setgid(0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000008, 0x2010, 0xffffffffffffffff, 0x579) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) setregid(0x0, 0xee01) (async) setgid(0xffffffffffffffff) (async) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000008, 0x2010, 0xffffffffffffffff, 0x579) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) (async) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) (async) 20:24:45 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) setregid(0xee01, 0x0) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) (async) 20:24:45 executing program 1: setregid(0x0, 0xee01) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20820, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x2742}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@default_permissions}], [{@uid_gt={'uid>', 0xee00}}, {@fsname={'fsname', 0x3d, '/+['}}, {@audit}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff7f}}, {@obj_role={'obj_role', 0x3d, '\\('}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@subj_type={'subj_type', 0x3d, '*'}}]}}) 20:24:45 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) (async) setregid(0xee01, 0x0) 20:24:45 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 20:24:45 executing program 1: setregid(0x0, 0xee01) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20820, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x2742}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@default_permissions}], [{@uid_gt={'uid>', 0xee00}}, {@fsname={'fsname', 0x3d, '/+['}}, {@audit}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff7f}}, {@obj_role={'obj_role', 0x3d, '\\('}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@subj_type={'subj_type', 0x3d, '*'}}]}}) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x1, &(0x7f0000000040)=0x12, 0x5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x1, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xa}, 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe0, 0x5], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0, 0x1}) 20:24:46 executing program 4: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)) (async, rerun: 64) setregid(0xee01, 0x0) (rerun: 64) 20:24:46 executing program 1: setregid(0x0, 0xee01) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20820, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x2742}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@default_permissions}], [{@uid_gt={'uid>', 0xee00}}, {@fsname={'fsname', 0x3d, '/+['}}, {@audit}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffff7f}}, {@obj_role={'obj_role', 0x3d, '\\('}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@subj_type={'subj_type', 0x3d, '*'}}]}}) 20:24:46 executing program 4: setregid(0xee01, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1080000, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200060000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,blksize=0x0000000000001000,blksize=0x0000000000000000,max_read=0x0000000000000001,subj_type=[(-\\&,audit,context=sysadm_u,smackfshat=$,dont_appraise,\x00']) getegid() 20:24:46 executing program 1: pivot_root(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000010000)='./file0\x00') 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x1, &(0x7f0000000040)=0x12, 0x5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x1, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xa}, 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe0, 0x5], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0, 0x1}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x1, &(0x7f0000000040)=0x12, 0x5) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x1, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xa}, 0x48) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x100) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe0, 0x5], 0x2, 0x80000}) (async) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0, 0x1}) (async) 20:24:46 executing program 4: setregid(0xee01, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r2 = getegid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1080000, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200060000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,blksize=0x0000000000001000,blksize=0x0000000000000000,max_read=0x0000000000000001,subj_type=[(-\\&,audit,context=sysadm_u,smackfshat=$,dont_appraise,\x00']) getegid() setregid(0xee01, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) (async) getegid() (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1080000, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200060000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,blksize=0x0000000000001000,blksize=0x0000000000000000,max_read=0x0000000000000001,subj_type=[(-\\&,audit,context=sysadm_u,smackfshat=$,dont_appraise,\x00']) (async) getegid() (async) 20:24:46 executing program 1: pivot_root(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000010000)='./file0\x00') 20:24:46 executing program 4: setregid(0xee01, 0x0) (async) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000009c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) (async) r2 = getegid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1080000, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000200060000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,default_permissions,default_permissions,blksize=0x0000000000001000,blksize=0x0000000000000000,max_read=0x0000000000000001,subj_type=[(-\\&,audit,context=sysadm_u,smackfshat=$,dont_appraise,\x00']) (async) getegid() 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x1, &(0x7f0000000040)=0x12, 0x5) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x1, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xa}, 0x48) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x100) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0xe0, 0x5], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r1, 0xc00864bf, &(0x7f0000000200)={0x0, 0x1}) 20:24:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf0, 0x0, 0x200, 0x1000, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38, 0x12}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x23a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nicvf0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) setregid(0xee01, 0xffffffffffffffff) 20:24:46 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x64) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 1: pivot_root(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000010000)='./file0\x00') pivot_root(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000010000)='./file0\x00') (async) 20:24:46 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x64) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf0, 0x0, 0x200, 0x1000, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38, 0x12}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x23a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nicvf0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) (async) setregid(0xee01, 0xffffffffffffffff) 20:24:46 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setregid(0x0, 0xee00) 20:24:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf0, 0x0, 0x200, 0x1000, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38, 0x12}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x23a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nicvf0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) setregid(0xee01, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf0, 0x0, 0x200, 0x1000, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x38, 0x12}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x23a}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nicvf0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x4040) (async) setregid(0xee01, 0xffffffffffffffff) (async) 20:24:46 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x64) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setregid(0x0, 0xee00) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x400, 0x200, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x100) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x2000, 0x1, &(0x7f00000003c0)) setregid(r0, r1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:46 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setregid(0x0, 0xee00) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0xa95b, 0x7) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:46 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x400, 0x200, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x100) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x2000, 0x1, &(0x7f00000003c0)) setregid(r0, r1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000140)) (async) statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x400, 0x200, &(0x7f0000000280)) (async) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x100) (async) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x2000, 0x1, &(0x7f00000003c0)) (async) setregid(r0, r1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) (async) 20:24:46 executing program 1: set_mempolicy(0x4000, &(0x7f0000000000)=0xa95b, 0x7) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x77ef9) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4000, 0x80, &(0x7f00000002c0)) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000140)={0x80000000, &(0x7f0000000040), &(0x7f00000000c0)=[{}, {{}, {0x80000000}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f00000001c0)}) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 2: set_mempolicy(0x8000, &(0x7f0000000000)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000040)=0x8, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x800) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) statx(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x400, 0x200, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchmodat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x100) (async) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x2000, 0x1, &(0x7f00000003c0)) (async) setregid(r0, r1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 20:24:46 executing program 2: set_mempolicy(0x8000, &(0x7f0000000000)=0x2, 0x7) set_mempolicy(0x8000, &(0x7f0000000040)=0x8, 0x2) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0x2, 0x7) (async) set_mempolicy(0x8000, &(0x7f0000000040)=0x8, 0x2) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) 20:24:46 executing program 1: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) r0 = socket(0x2, 0x6, 0x1f6) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000140), 0x4) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x1, '`'}, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000180)) 20:24:46 executing program 2: set_mempolicy(0x8000, &(0x7f0000000000)=0x2, 0x7) (async) set_mempolicy(0x8000, &(0x7f0000000040)=0x8, 0x2) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 4: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000480)={0x5, &(0x7f0000000000)=""/133, &(0x7f0000000400)=[{0x1, 0xf2, 0x0, &(0x7f00000000c0)=""/242}, {0x10000, 0x9d, 0x401, &(0x7f00000001c0)=""/157}, {0x6, 0x52, 0x3, &(0x7f0000000280)=""/82}, {0x7, 0x2, 0x1f, &(0x7f0000000300)=""/2}, {0x1c2f, 0x96, 0x4, &(0x7f0000000340)=""/150}]}) setregid(0xee01, 0x0) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x2000000000a95b, 0x4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x2000000000a95b, 0x4) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 4: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000480)={0x5, &(0x7f0000000000)=""/133, &(0x7f0000000400)=[{0x1, 0xf2, 0x0, &(0x7f00000000c0)=""/242}, {0x10000, 0x9d, 0x401, &(0x7f00000001c0)=""/157}, {0x6, 0x52, 0x3, &(0x7f0000000280)=""/82}, {0x7, 0x2, 0x1f, &(0x7f0000000300)=""/2}, {0x1c2f, 0x96, 0x4, &(0x7f0000000340)=""/150}]}) setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000480)={0x5, &(0x7f0000000000)=""/133, &(0x7f0000000400)=[{0x1, 0xf2, 0x0, &(0x7f00000000c0)=""/242}, {0x10000, 0x9d, 0x401, &(0x7f00000001c0)=""/157}, {0x6, 0x52, 0x3, &(0x7f0000000280)=""/82}, {0x7, 0x2, 0x1f, &(0x7f0000000300)=""/2}, {0x1c2f, 0x96, 0x4, &(0x7f0000000340)=""/150}]}) (async) setregid(0xee01, 0x0) (async) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x2000000000a95b, 0x4) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) 20:24:46 executing program 4: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000480)={0x5, &(0x7f0000000000)=""/133, &(0x7f0000000400)=[{0x1, 0xf2, 0x0, &(0x7f00000000c0)=""/242}, {0x10000, 0x9d, 0x401, &(0x7f00000001c0)=""/157}, {0x6, 0x52, 0x3, &(0x7f0000000280)=""/82}, {0x7, 0x2, 0x1f, &(0x7f0000000300)=""/2}, {0x1c2f, 0x96, 0x4, &(0x7f0000000340)=""/150}]}) (async) setregid(0xee01, 0x0) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x4, 0xffffffff) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 4: mount$fuseblk(&(0x7f0000001140), 0x0, 0x0, 0x0, &(0x7f0000001200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) setregid(0xee01, 0x0) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) (async) set_mempolicy(0x0, &(0x7f0000000040)=0x4, 0xffffffff) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) (async) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 4: mount$fuseblk(&(0x7f0000001140), 0x0, 0x0, 0x0, &(0x7f0000001200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) setregid(0xee01, 0x0) mount$fuseblk(&(0x7f0000001140), 0x0, 0x0, 0x0, &(0x7f0000001200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) (async) setregid(0xee01, 0x0) (async) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x4, 0xffffffff) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:46 executing program 4: mount$fuseblk(&(0x7f0000001140), 0x0, 0x0, 0x0, &(0x7f0000001200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) setregid(0xee01, 0x0) mount$fuseblk(&(0x7f0000001140), 0x0, 0x0, 0x0, &(0x7f0000001200)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) (async) setregid(0xee01, 0x0) (async) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 2: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) uselib(&(0x7f0000000140)='./file0\x00') setregid(0xffffffffffffffff, r0) getegid() 20:24:46 executing program 2: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 1: keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 2: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:46 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) uselib(&(0x7f0000000140)='./file0\x00') setregid(0xffffffffffffffff, r0) (async, rerun: 64) getegid() (rerun: 64) 20:24:46 executing program 2: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:47 executing program 1: keyctl$join(0x1, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) 20:24:47 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) uselib(&(0x7f0000000140)='./file0\x00') setregid(0xffffffffffffffff, r0) getegid() statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x4, &(0x7f0000000040)) (async) uselib(&(0x7f0000000140)='./file0\x00') (async) setregid(0xffffffffffffffff, r0) (async) getegid() (async) 20:24:47 executing program 1: keyctl$join(0x1, 0x0) keyctl$join(0x1, 0x0) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x4, 0xffffffff) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000000c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:47 executing program 4: setregid(0xee01, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@subj_type={'subj_type', 0x3d, '!:'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsname}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type', 0x3d, ')+{+'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 20:24:47 executing program 2: keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) r0 = syz_open_dev$dri(&(0x7f0000000280), 0xffefffffffffffff, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(r0, 0xc01064c2, &(0x7f0000000140)) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x0}) setregid(0x0, 0xee01) 20:24:47 executing program 4: setregid(0xee01, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@subj_type={'subj_type', 0x3d, '!:'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsname}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type', 0x3d, ')+{+'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) setregid(0xee01, 0x0) (async) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@subj_type={'subj_type', 0x3d, '!:'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsname}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type', 0x3d, ')+{+'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 20:24:47 executing program 2: setregid(0xee01, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@subj_type={'subj_type', 0x3d, '!:'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsname}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type', 0x3d, ')+{+'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 20:24:47 executing program 4: setregid(0xee01, 0x0) (async) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@msize={'msize', 0x3d, 0x3}}], [{@subj_type={'subj_type', 0x3d, '!:'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@fsname}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type', 0x3d, ')+{+'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x0, 0x4, 0x800, 0x0, 0x11}) 20:24:47 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/66) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r2) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r0, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x44052) 20:24:47 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/66) 20:24:47 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000000)=""/66) 20:24:47 executing program 2: mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1000000, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@sq={'sq', 0x3d, 0xffffffffffffffff}}, {@sq={'sq', 0x3d, 0x9}}], [{@fowner_gt={'fowner>', 0xee00}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@obj_type}, {@smackfstransmute={'smackfstransmute', 0x3d, '1*!'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x2, 0x3) setregid(0xee01, 0x0) setxattr$incfs_id(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)={'0000000000000000000000000000000', 0x33}, 0x20, 0x3) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000300)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) r1 = geteuid() r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000040)=""/4096) set_mempolicy(0x2, &(0x7f0000001040)=0x7fffffffffffffff, 0x6) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@cachetag={'cachetag', 0x3d, '/dev/snd/timer\x00'}}, {@version_9p2000}], [{@euid_lt={'euid<', r1}}, {@pcr={'pcr', 0x3d, 0x8}}]}}) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) r1 = geteuid() r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000040)=""/4096) set_mempolicy(0x2, &(0x7f0000001040)=0x7fffffffffffffff, 0x6) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@cachetag={'cachetag', 0x3d, '/dev/snd/timer\x00'}}, {@version_9p2000}], [{@euid_lt={'euid<', r1}}, {@pcr={'pcr', 0x3d, 0x8}}]}}) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) r1 = geteuid() r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000040)=""/4096) set_mempolicy(0x2, &(0x7f0000001040)=0x7fffffffffffffff, 0x6) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r2, 0x80605414, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x800, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_uid={'access', 0x3d, 0xee01}}, {@cachetag={'cachetag', 0x3d, '/dev/snd/timer\x00'}}, {@version_9p2000}], [{@euid_lt={'euid<', r1}}, {@pcr={'pcr', 0x3d, 0x8}}]}}) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) geteuid() r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) set_mempolicy(0x2, &(0x7f0000001040)=0x7fffffffffffffff, 0x6) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x80605414, &(0x7f0000000200)) 20:24:47 executing program 4: set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) geteuid() r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) set_mempolicy(0x2, &(0x7f0000001040)=0x7fffffffffffffff, 0x6) 20:24:47 executing program 4: set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) geteuid() r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) 20:24:47 executing program 4: set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) geteuid() openat(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:24:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) geteuid() 20:24:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, 0x0, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, 0x0, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, 0x0, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000), 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000), 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000), 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, 0x0, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, 0x0, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, 0x0, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000), 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x0, &(0x7f0000000040)=0x7fffffffffffffff, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000), 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, 0x0, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000), 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, 0x0, 0x3) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, 0x0, 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040), 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040), 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(0x0, 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040), 0x3) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(0x0, 0x1, 0x440) 20:24:47 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x0) 20:24:47 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(0x0, 0x1, 0x440) 20:24:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x0) 20:24:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x440) 20:24:48 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) set_mempolicy(0x8003, &(0x7f0000000040)=0x7fffffffffffffff, 0x0) 20:24:48 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x0, 0x0) 20:25:16 executing program 5: set_mempolicy(0x3, 0x0, 0x7) syz_open_dev$usbmon(&(0x7f0000000100), 0x1, 0x440) 20:25:16 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0xd33) 20:25:16 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:16 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x80000, 0x84) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0xc000, 0xfffff8e4) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x400, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x90) openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x101001, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18}, './file0\x00'}) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000004c0), 0x822c1) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000500)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) mount$9p_rdma(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x10, &(0x7f00000002c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) mount$pvfs2(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x1000801, &(0x7f0000000400)={[{'rootcontext'}], [{@pcr={'pcr', 0x3d, 0x19}}, {@smackfstransmute={'smackfstransmute', 0x3d, '!![):^'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) 20:25:16 executing program 2: setregid(0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20000, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e24,timeout=0xfffffffffffff619,mmap,cache=none,timeout=0x0000000000010000,sq=0xffffffffffffffff,rq=0x0000000 00000009,timeout=0x0000000000000002,timeout=0x000000000P00dcd0,rootcontex_u,measure,appraise,obj_type=,smackfshat=:,defcontext=sysadm_u,uid=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB="2c6673757569643d38533735626165392d6b33639c2d616535642d153590382d00356562356433392c666f776e65723c", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'system.', '&\'%\x8c%\x00'}, &(0x7f00000002c0)='port', 0x4, 0x2) 20:25:16 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, r2, 0x0, 0x0, r3, 0x0, r5], 0x6, 0x7, 0x3}) 20:25:16 executing program 4: removexattr(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)=@known='system.posix_acl_access\x00') setregid(0xee01, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x400, 0x100], 0x2, 0x800}) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) statx(r1, &(0x7f0000001040)='./file0\x00', 0x2000, 0x2, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='system.posix_acl_default\x00', &(0x7f0000001180)={{}, {0x1, 0x7}, [{0x2, 0x6, r2}, {0x2, 0x0, r2}, {0x2, 0x1, 0xee00}, {0x2, 0x1, r2}, {0x2, 0x0, r2}], {0x4, 0x4}, [{0x8, 0x4, r3}]}, 0x54, 0x2) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: setregid(0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20000, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e24,timeout=0xfffffffffffff619,mmap,cache=none,timeout=0x0000000000010000,sq=0xffffffffffffffff,rq=0x0000000 00000009,timeout=0x0000000000000002,timeout=0x000000000P00dcd0,rootcontex_u,measure,appraise,obj_type=,smackfshat=:,defcontext=sysadm_u,uid=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB="2c6673757569643d38533735626165392d6b33639c2d616535642d153590382d00356562356433392c666f776e65723c", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'system.', '&\'%\x8c%\x00'}, &(0x7f00000002c0)='port', 0x4, 0x2) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) r0 = syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000029b49376e51defbf595f329f14603e0f9a28ad938999a5601ed41acf201f8fa918d47c79d27a1ff791362c958ba30be5591260b0cb19b663b1412e6c335c59afe1817bfbfa6d", @ANYRES32=r0, @ANYBLOB="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"]) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, r2, 0x0, 0x0, r3, 0x0, r5], 0x6, 0x7, 0x3}) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0xd33) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: setregid(0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20000, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e24,timeout=0xfffffffffffff619,mmap,cache=none,timeout=0x0000000000010000,sq=0xffffffffffffffff,rq=0x0000000 00000009,timeout=0x0000000000000002,timeout=0x000000000P00dcd0,rootcontex_u,measure,appraise,obj_type=,smackfshat=:,defcontext=sysadm_u,uid=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB="2c6673757569643d38533735626165392d6b33639c2d616535642d153590382d00356562356433392c666f776e65723c", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'system.', '&\'%\x8c%\x00'}, &(0x7f00000002c0)='port', 0x4, 0x2) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) r0 = syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000029b49376e51defbf595f329f14603e0f9a28ad938999a5601ed41acf201f8fa918d47c79d27a1ff791362c958ba30be5591260b0cb19b663b1412e6c335c59afe1817bfbfa6d", @ANYRES32=r0, @ANYBLOB="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"]) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)={0x0}) r4 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r4, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, r2, 0x0, 0x0, r3, 0x0, r5], 0x6, 0x7, 0x3}) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0xd33) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) r0 = syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000029b49376e51defbf595f329f14603e0f9a28ad938999a5601ed41acf201f8fa918d47c79d27a1ff791362c958ba30be5591260b0cb19b663b1412e6c335c59afe1817bfbfa6d", @ANYRES32=r0, @ANYBLOB="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"]) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: setregid(0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x20000, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e24,timeout=0xfffffffffffff619,mmap,cache=none,timeout=0x0000000000010000,sq=0xffffffffffffffff,rq=0x0000000 00000009,timeout=0x0000000000000002,timeout=0x000000000P00dcd0,rootcontex_u,measure,appraise,obj_type=,smackfshat=:,defcontext=sysadm_u,uid=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0xee01, @ANYBLOB="2c6673757569643d38533735626165392d6b33639c2d616535642d153590382d00356562356433392c666f776e65723c", @ANYRESDEC, @ANYBLOB=',\x00']) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) r0 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) set_mempolicy(0x4000, &(0x7f0000000080)=0x1, 0xff) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 2: setregid(0xffffffffffffffff, 0x0) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) r0 = syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010000001800000029b49376e51defbf595f329f14603e0f9a28ad938999a5601ed41acf201f8fa918d47c79d27a1ff791362c958ba30be5591260b0cb19b663b1412e6c335c59afe1817bfbfa6d", @ANYRES32=r0, @ANYBLOB="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"]) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffffffffffff, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) 20:25:17 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) r0 = syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40000) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) 20:25:17 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f0000000140)={0x0, 0x1}) 20:25:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 3: syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 4: syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000002c0)={0x0, 0x2, 0xc4fa}) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) 20:25:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 3: syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 4: syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, 0x0, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) 20:25:17 executing program 3: syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:17 executing program 4: syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, 0x0, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:17 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) 20:25:17 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, 0x0, 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE_SYNC_FILE(0xffffffffffffffff, 0xc01064c2, &(0x7f0000000100)) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) 20:25:17 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040), 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(0xffffffffffffffff, 0xc00864bf, &(0x7f00000000c0)) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:17 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', 0x0}) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040), 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) 20:25:17 executing program 4: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 1: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', 0x0}) 20:25:17 executing program 3: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040), 0x6) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', 0x0}) 20:25:17 executing program 4: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x2, 0x3, 0x7, 0x0, 0x8}) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)}) 20:25:17 executing program 3: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 4: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x21a900) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)}) 20:25:17 executing program 3: set_mempolicy(0x2, 0x0, 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000), 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:17 executing program 1: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:17 executing program 4: set_mempolicy(0x2, &(0x7f0000000000), 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000040), 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)}) 20:25:17 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:17 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) 20:25:18 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000), 0x7) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:18 executing program 2: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040), 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:18 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x6) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040), 0x7) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'vlan0\x00', &(0x7f0000000500)=@ethtool_cmd={0x19}}) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x0) syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) 20:25:18 executing program 1: getegid() newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400, 0x7ff, &(0x7f00000001c0)) setxattr$incfs_id(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), &(0x7f0000000640)={'0000000000000000000000000000000', 0x31}, 0x20, 0x2) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2000) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x100) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x100) r1 = geteuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$nfs(&(0x7f0000000680)='/]\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x1800, &(0x7f0000000800)={[{'0000000000000000000000000000000'}, {'@'}, {'!&-\'&q'}, {}, {'$-('}], [{@euid_gt={'euid>', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user.incfs.id\x00'}}, {@uid_gt={'uid>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x10001}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) setregid(r0, 0xffffffffffffffff) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(0x0, 0x0, 0x0) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r3}, {0x8, 0x1, r4}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) set_mempolicy(0x4000, &(0x7f0000000040)=0x8000000000000001, 0x9) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x0) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(0x0, 0x0, 0x0) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB2(0xffffffffffffffff, 0xc06864b8, &(0x7f0000000300)={0xd753, 0x101, 0x81, 0xfff, 0x1, [0x7f, 0x155d, 0x3f, 0x8], [0x4, 0x0, 0xffffff7f, 0x8], [0x1, 0x40, 0x40, 0x5], [0xffffffff, 0x200, 0x100, 0x34]}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r3}, {0x8, 0x1, r4}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) set_mempolicy(0x4000, &(0x7f0000000040)=0x8000000000000001, 0x9) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x12f802) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x0) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(0x0, 0x0, 0x0) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee01) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x0) syz_open_dev$dri(&(0x7f0000000200), 0x47b, 0x2687c0) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r3}, {0x8, 0x1, r4}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) set_mempolicy(0x4000, &(0x7f0000000040)=0x8000000000000001, 0x9) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 4: set_mempolicy(0x2, &(0x7f0000000000)=0xa95b, 0x7) syz_open_dev$dri(0x0, 0x0, 0x0) 20:25:18 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(0x0, 0x47b, 0x2687c0) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r3}, {0x8, 0x1, r4}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x400000) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000040)=""/4096) faccessat(r1, &(0x7f0000000180)='./file0\x00', 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000140)={0x8, 0x0, 0xd988, 0x200, 0x1d, 0x1c8}) socket$bt_bnep(0x1f, 0x3, 0x4) utimensat(r1, &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={{0x77359400}, {0x0, 0x2710}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x1f900e47], 0x1, 0x80000}) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(0x0, 0x0, 0x2687c0) 20:25:18 executing program 0: setregid(0xffffffffffffffff, 0xffffffffffffffff) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x12f802) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2, r3}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000400) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x2, {0x8, [{{0x2, 0x2, 0x5}, 0x0, 0x20, 0x7, './file0'}, {{0x40, 0x1, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x4, 0x4, 0x6}, 0x7, 0x80, 0x7, './file0'}, {{0x0, 0x3, 0x8}, 0x1, 0x6, 0x7, './file0'}]}}, 0x87) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0xa959, 0x7) syz_open_dev$dri(0x0, 0x0, 0x0) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580), 0x10000, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x2, {0x8, [{{0x2, 0x2, 0x5}, 0x0, 0x20, 0x7, './file0'}, {{0x40, 0x1, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x4, 0x4, 0x6}, 0x7, 0x80, 0x7, './file0'}, {{0x0, 0x3, 0x8}, 0x1, 0x6, 0x7, './file0'}]}}, 0x87) 20:25:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x2, {0x8, [{{0x2, 0x2, 0x5}, 0x0, 0x20, 0x7, './file0'}, {{0x40, 0x1, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x4, 0x4, 0x6}, 0x7, 0x80, 0x7, './file0'}, {{0x0, 0x3, 0x8}, 0x1, 0x6, 0x7, './file0'}]}}, 0x87) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 2: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x2, {0x8, [{{0x2, 0x2, 0x5}, 0x0, 0x20, 0x7, './file0'}, {{0x40, 0x1, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x4, 0x4, 0x6}, 0x7, 0x80, 0x7, './file0'}, {{0x0, 0x3, 0x8}, 0x1, 0x6, 0x7, './file0'}]}}, 0x87) 20:25:18 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x105200) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r0, &(0x7f0000000180)={0x87, 0x29, 0x2, {0x8, [{{0x2, 0x2, 0x5}, 0x0, 0x20, 0x7, './file0'}, {{0x40, 0x1, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x4, 0x4, 0x6}, 0x7, 0x80, 0x7, './file0'}, {{0x0, 0x3, 0x8}, 0x1, 0x6, 0x7, './file0'}]}}, 0x87) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:25:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$9p(&(0x7f0000000140), 0x80000) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:25:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 4: shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3, r2}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) 20:25:18 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) getrusage(0xffffffffffffffff, &(0x7f0000000240)) 20:25:18 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000080)={0x4, 0x7fff, 0x7, 0x4, 0x6, [0x6922, 0xffffffff, 0x7fffffff, 0x3f], [0x8, 0x5, 0x0, 0x9], [0xf66, 0xfffffffd, 0x9, 0x6], [0x9, 0x9, 0x2, 0x7]}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:18 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = geteuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@posixacl}, {@version_L}], [{@subj_user={'subj_user', 0x3d, '$a'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/timer\x00'}}, {@permit_directio}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq={'uid', 0x3d, r1}}]}}) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4, r1}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:18 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 0: getrusage(0xffffffffffffffff, &(0x7f0000000240)) 20:25:19 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800, 0x0, 0xffffffffffffffff}) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000100)) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r0 = geteuid() mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4, r0}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 0: getrusage(0x0, &(0x7f0000000240)) 20:25:19 executing program 5: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ba7, 0x101, 0xb38b, 0x3, 0x1], 0x5, 0x800}) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 0: getrusage(0x0, &(0x7f0000000240)) 20:25:19 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) 20:25:19 executing program 5: shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 2: setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 1: set_mempolicy(0x0, &(0x7f0000000000)=0xa95b, 0x1000000000000008) mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x804, 0x8000) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='@[\\\\,\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='-$#)}\'w\x00', &(0x7f0000000140)='#\x00'], &(0x7f0000000400)=[&(0x7f00000001c0)='+!:\x00', &(0x7f0000000200)='-!+$-$\\}[#]+,(\x00', &(0x7f0000000240)='{@}&\'[\x00', &(0x7f0000000280)='\x17 @\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/]*%-\x00', &(0x7f0000000340)='\xd4/(!-%\x00', &(0x7f0000000380)='(\x00', &(0x7f00000003c0)='\\}^%[!-\',#]\x00']) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000480)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000004c0)={r0}) 20:25:19 executing program 0: getrusage(0x0, &(0x7f0000000240)) 20:25:19 executing program 5: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 2: setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 4: set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 0: getrusage(0xffffffffffffffff, 0x0) 20:25:19 executing program 5: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 2: setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 0: getrusage(0xffffffffffffffff, 0x0) 20:25:19 executing program 4: setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() setregid(r0, r1) 20:25:19 executing program 1: mkdir(0x0, 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 2: socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 5: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 20:25:19 executing program 0: getrusage(0xffffffffffffffff, 0x0) 20:25:19 executing program 4: setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() setregid(r0, r1) 20:25:19 executing program 1: mkdir(0x0, 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 2: socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 5: set_mempolicy(0x1, &(0x7f0000000040)=0x5c3, 0x8000) 20:25:19 executing program 0: r0 = socket(0x23, 0xa, 0x40) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) set_mempolicy(0xb78a48b4cf8c5431, 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000280)=0x7, 0x2) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x29, 0x2, {0x3f}}, 0xb) 20:25:19 executing program 4: setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() setregid(r0, r1) 20:25:19 executing program 1: mkdir(0x0, 0x69) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 0: bind$rds(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(0xffffffffffffffff, 0xc01864b1, &(0x7f00000014c0)={0x3, 0x3, 0x6, 0x0, &(0x7f0000001480)}) mkdir(&(0x7f00000015c0)='./file1\x00', 0x0) pipe2$9p(0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f0000000040)={0x7, 0x400, 0x6, 0xc0e, 0x11, 0x7ff}) set_mempolicy(0x3, 0x0, 0x0) 20:25:19 executing program 2: socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(0xffffffffffffffff, 0x114, 0xa, &(0x7f0000000040)={0x3, "ff1ea6"}, 0x4) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 4: setregid(0xee01, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r0, 0x0) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 4: setregid(0xee01, 0x0) setregid(0x0, 0x0) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:25:19 executing program 4: setregid(0x0, 0x0) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) 20:25:19 executing program 4: setregid(0x0, 0x0) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) 20:25:19 executing program 4: setregid(0x0, 0x0) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040), 0x1) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) 20:25:19 executing program 4: setregid(0xffffffffffffffff, 0xee01) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040), 0x1) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x0, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 4: setregid(0xffffffffffffffff, 0xee01) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040), 0x1) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x0, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 4: setregid(0xffffffffffffffff, 0xee01) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x2, "ff1e"}, 0x3) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:19 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x0, 0x0, 0x8, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:19 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:19 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x2, "ff1e"}, 0x3) 20:25:19 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:19 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x3, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x2, "ff1e"}, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {0x1, 0x6}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 0: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{0x2, 0x3}, {0x2, 0x4}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x64, 0x3) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{0x2, 0x3}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x5c, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x54, 0x3) 20:25:20 executing program 2: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5, 0x6fe4b5ff], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x54, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7, 0x5], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x54, 0x3) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x10) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6, 0xfffffff7], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {0x4, 0x4}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x5c, 0x3) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 4: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(0x0, &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x7}, {0x20, 0x5}}, 0x5c, 0x3) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(0x0, &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x7}, {0x20, 0x5}}, 0x54, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(0x0, &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}], {0x10, 0x7}, {0x20, 0x5}}, 0x4c, 0x3) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}, {0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x7}, {0x20, 0x5}}, 0x44, 0x3) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 20:25:20 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:20 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2]}}) 20:25:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x3) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x3) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86, 0x6]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001, 0x86]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}], {}, {0x20, 0x5}}, 0x34, 0x3) 20:25:21 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x3) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6, 0x80000001]}}) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}]}, 0x34, 0x0) 20:25:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xffffffffffffffff}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff, 0x6]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], [0xfff]}}) 20:25:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:21 executing program 5: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d}}) 20:25:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 5: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 5: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:21 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:21 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:21 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:22 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:22 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x3c, 0x3) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, 0x0) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}]}}) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, 0x0) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x2, 0xee01}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:22 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 3: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}], {}, {0x20, 0x5}}, 0x34, 0x3) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}]}, 0x34, 0x3) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:23 executing program 4: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}]}, 0x34, 0x0) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:23 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}]}}) 20:25:23 executing program 4: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:23 executing program 4: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:23 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:23 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:23 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:23 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [{}], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:24 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, 0x0) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 20:25:24 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:24 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}], {}, [], {}, {0x20, 0x5}}, 0x2c, 0x3) 20:25:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:24 executing program 3: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}]}, 0x2c, 0x3) 20:25:25 executing program 3: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 1: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 4: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [{}]}, 0x2c, 0x0) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:25 executing program 1: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 1: setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, 0x0) 20:25:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 1: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [{0x8, 0x2, 0xee01}, {0x8, 0x3}], {0x10, 0x7}, {0x20, 0x5}}, 0x34, 0x3) 20:25:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:25 executing program 1: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 1: mkdir(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 4: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 3: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 4: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 4: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:25 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:25 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:26 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000500)={{}, {}, [], {}, [], {0x10, 0x7}, {0x20, 0x5}}, 0x24, 0x3) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 0: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500)={{}, {}, [], {}, [], {}, {0x20, 0x5}}, 0x24, 0x3) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500), 0x24, 0x3) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500), 0x24, 0x0) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 1: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000500), 0x24, 0x0) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}]}}) 20:25:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:26 executing program 5: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, 0x0) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:27 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:27 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}]}}) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 1: mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_hsr\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x6, 0x1ff, 0xfa, 0x6], [0xfff, 0x6, 0x80000001, 0x86, 0x6, 0x7, 0x1f, 0x2, 0x4]}}) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:28 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 3: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 0: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 4: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 5: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x3) 20:25:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 2: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:28 executing program 4: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 5: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 3: ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, &(0x7f0000000800)={"09bed3b4ba67ea49bdba7453c9821d69e1c9153c456b6e3754fc392ae65c7831"}) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x10) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) set_mempolicy(0x3, &(0x7f0000000000)=0xa95b, 0x7) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=[&(0x7f00000003c0)='default_permissions', &(0x7f0000000400)='FILE_MMAP', &(0x7f0000000440)='rootmode', &(0x7f0000000480)='fuseblk\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='uid<'], &(0x7f0000000780)=[&(0x7f0000000580)='user_id', &(0x7f00000005c0)='!-\x00', &(0x7f0000000600)='\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='rootmode', &(0x7f00000006c0)='&\x00', &(0x7f0000000700)='group_id', &(0x7f0000000740)='group_id']) 20:25:29 executing program 4: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 2: mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 1) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 1) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1118.942218] FAULT_INJECTION: forcing a failure. [ 1118.942218] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.997538] CPU: 0 PID: 4435 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1119.005366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.014715] Call Trace: [ 1119.017301] dump_stack+0x1b2/0x281 [ 1119.020929] should_fail.cold+0x10a/0x149 [ 1119.025081] should_failslab+0xd6/0x130 [ 1119.029058] __kmalloc_track_caller+0x2bc/0x400 [ 1119.033724] ? strndup_user+0x5b/0xf0 [ 1119.037526] memdup_user+0x22/0xa0 [ 1119.041065] strndup_user+0x5b/0xf0 [ 1119.044691] ? copy_mnt_ns+0xa30/0xa30 [ 1119.048582] SyS_mount+0x39/0x120 [ 1119.052035] ? copy_mnt_ns+0xa30/0xa30 [ 1119.055917] do_syscall_64+0x1d5/0x640 [ 1119.059805] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.064987] RIP: 0033:0x7f4de1f650c9 [ 1119.068687] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.076385] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1119.083644] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.090905] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.098168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1119.105430] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.140552] FAULT_INJECTION: forcing a failure. [ 1119.140552] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.179921] CPU: 0 PID: 4456 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1119.187741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.197097] Call Trace: [ 1119.199698] dump_stack+0x1b2/0x281 [ 1119.203333] should_fail.cold+0x10a/0x149 [ 1119.207486] should_failslab+0xd6/0x130 [ 1119.211462] __kmalloc_track_caller+0x2bc/0x400 [ 1119.216162] ? strndup_user+0x5b/0xf0 [ 1119.219964] memdup_user+0x22/0xa0 [ 1119.223497] strndup_user+0x5b/0xf0 [ 1119.227118] ? copy_mnt_ns+0xa30/0xa30 [ 1119.231093] SyS_mount+0x39/0x120 [ 1119.234540] ? copy_mnt_ns+0xa30/0xa30 [ 1119.238428] do_syscall_64+0x1d5/0x640 [ 1119.242318] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.247513] RIP: 0033:0x7f7c2b8220c9 [ 1119.251215] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.258941] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1119.266206] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.273467] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1119.280729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:25:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 2) 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.287991] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 2) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.388528] FAULT_INJECTION: forcing a failure. [ 1119.388528] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.428149] CPU: 1 PID: 4474 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.435970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.445319] Call Trace: [ 1119.447906] dump_stack+0x1b2/0x281 [ 1119.451536] should_fail.cold+0x10a/0x149 [ 1119.455684] should_failslab+0xd6/0x130 [ 1119.459663] __kmalloc_track_caller+0x2bc/0x400 [ 1119.464339] ? strndup_user+0x5b/0xf0 [ 1119.468141] memdup_user+0x22/0xa0 [ 1119.471683] strndup_user+0x5b/0xf0 [ 1119.475312] ? copy_mnt_ns+0xa30/0xa30 [ 1119.479199] SyS_mount+0x68/0x120 [ 1119.482649] ? copy_mnt_ns+0xa30/0xa30 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.486536] do_syscall_64+0x1d5/0x640 [ 1119.490425] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.495608] RIP: 0033:0x7f4de1f650c9 [ 1119.499308] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.507102] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1119.514368] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.521630] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1119.528893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1119.536160] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1119.547077] FAULT_INJECTION: forcing a failure. [ 1119.547077] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.567171] CPU: 1 PID: 4485 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1119.574973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.584322] Call Trace: 20:25:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 3) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.586915] dump_stack+0x1b2/0x281 [ 1119.590542] should_fail.cold+0x10a/0x149 [ 1119.594690] should_failslab+0xd6/0x130 [ 1119.598665] __kmalloc_track_caller+0x2bc/0x400 [ 1119.603330] ? strndup_user+0x5b/0xf0 [ 1119.607133] memdup_user+0x22/0xa0 [ 1119.610670] strndup_user+0x5b/0xf0 [ 1119.614300] ? copy_mnt_ns+0xa30/0xa30 [ 1119.618188] SyS_mount+0x68/0x120 [ 1119.621636] ? copy_mnt_ns+0xa30/0xa30 [ 1119.625519] do_syscall_64+0x1d5/0x640 [ 1119.629413] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.634597] RIP: 0033:0x7f7c2b8220c9 [ 1119.638299] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.646003] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1119.653271] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.659651] FAULT_INJECTION: forcing a failure. [ 1119.659651] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.660529] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1119.660535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1119.660541] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1119.709740] CPU: 0 PID: 4504 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1119.717549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.726896] Call Trace: [ 1119.729482] dump_stack+0x1b2/0x281 [ 1119.733110] should_fail.cold+0x10a/0x149 [ 1119.733433] FAULT_INJECTION: forcing a failure. [ 1119.733433] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.737276] should_failslab+0xd6/0x130 [ 1119.737291] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1119.737306] ? copy_mnt_ns+0xa30/0xa30 [ 1119.761053] copy_mount_options+0x59/0x2f0 [ 1119.765272] ? copy_mnt_ns+0xa30/0xa30 [ 1119.769143] SyS_mount+0x84/0x120 [ 1119.772576] ? copy_mnt_ns+0xa30/0xa30 [ 1119.776447] do_syscall_64+0x1d5/0x640 [ 1119.780319] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.785490] RIP: 0033:0x7f4de1f650c9 20:25:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 3) 20:25:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1119.789189] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.796885] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1119.804145] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.811398] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1119.818654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1119.825915] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1119.833553] CPU: 1 PID: 4511 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1119.841345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1119.850692] Call Trace: [ 1119.853291] dump_stack+0x1b2/0x281 [ 1119.856918] should_fail.cold+0x10a/0x149 [ 1119.861088] should_failslab+0xd6/0x130 [ 1119.865061] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1119.869726] ? copy_mnt_ns+0xa30/0xa30 [ 1119.873611] copy_mount_options+0x59/0x2f0 [ 1119.877848] ? copy_mnt_ns+0xa30/0xa30 [ 1119.881740] SyS_mount+0x84/0x120 [ 1119.885195] ? copy_mnt_ns+0xa30/0xa30 [ 1119.889083] do_syscall_64+0x1d5/0x640 [ 1119.892974] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1119.898164] RIP: 0033:0x7f7c2b8220c9 [ 1119.901866] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.909571] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1119.916835] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1119.924102] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1119.931366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:25:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 4) 20:25:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}}) [ 1119.936535] FAULT_INJECTION: forcing a failure. [ 1119.936535] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.938627] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1120.053179] CPU: 0 PID: 4521 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1120.061011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1120.070449] Call Trace: [ 1120.073036] dump_stack+0x1b2/0x281 [ 1120.076695] should_fail.cold+0x10a/0x149 [ 1120.080849] should_failslab+0xd6/0x130 [ 1120.084823] kmem_cache_alloc+0x28e/0x3c0 [ 1120.088969] getname_flags+0xc8/0x550 [ 1120.092779] user_path_at_empty+0x2a/0x50 [ 1120.096931] do_mount+0x118/0x2a30 [ 1120.100469] ? copy_mount_string+0x40/0x40 [ 1120.104694] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.109692] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1120.114623] ? copy_mnt_ns+0xa30/0xa30 [ 1120.118551] ? copy_mount_options+0x1fa/0x2f0 [ 1120.123039] ? copy_mnt_ns+0xa30/0xa30 [ 1120.126922] SyS_mount+0xa8/0x120 [ 1120.130372] ? copy_mnt_ns+0xa30/0xa30 [ 1120.134243] do_syscall_64+0x1d5/0x640 [ 1120.138119] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1120.143295] RIP: 0033:0x7f4de1f650c9 20:25:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 4) 20:25:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1120.146993] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.154678] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1120.161932] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1120.169194] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1120.176472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.183730] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 20:25:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 5) 20:25:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}}) 20:25:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) [ 1120.302748] FAULT_INJECTION: forcing a failure. [ 1120.302748] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.337561] FAULT_INJECTION: forcing a failure. [ 1120.337561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1120.349379] CPU: 1 PID: 4558 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1120.357166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1120.366517] Call Trace: [ 1120.369104] dump_stack+0x1b2/0x281 [ 1120.372733] should_fail.cold+0x10a/0x149 [ 1120.376881] __alloc_pages_nodemask+0x21e/0x2900 [ 1120.381636] ? deref_stack_reg+0x124/0x1a0 [ 1120.385868] ? is_bpf_text_address+0x91/0x150 [ 1120.390363] ? __lock_acquire+0x5fc/0x3f20 [ 1120.394607] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1120.399448] ? kernel_text_address+0xbd/0xf0 [ 1120.403854] ? __kernel_text_address+0x9/0x30 [ 1120.408349] ? depot_save_stack+0x10d/0x3f0 [ 1120.412667] ? kasan_kmalloc+0x139/0x160 [ 1120.416728] cache_grow_begin+0x91/0x700 [ 1120.420784] ? fs_reclaim_release+0xd0/0x110 [ 1120.425196] ? check_preemption_disabled+0x35/0x240 [ 1120.430218] cache_alloc_refill+0x273/0x350 [ 1120.434545] kmem_cache_alloc+0x333/0x3c0 [ 1120.438694] getname_flags+0xc8/0x550 [ 1120.442496] user_path_at_empty+0x2a/0x50 [ 1120.446643] do_mount+0x118/0x2a30 [ 1120.450189] ? copy_mount_string+0x40/0x40 [ 1120.452226] FAULT_INJECTION: forcing a failure. [ 1120.452226] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.454419] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.454439] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1120.454449] ? copy_mnt_ns+0xa30/0xa30 [ 1120.454461] ? copy_mount_options+0x1fa/0x2f0 [ 1120.454469] ? copy_mnt_ns+0xa30/0xa30 [ 1120.454483] SyS_mount+0xa8/0x120 [ 1120.491123] ? copy_mnt_ns+0xa30/0xa30 [ 1120.495013] do_syscall_64+0x1d5/0x640 20:25:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 20:25:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000100), 0x1, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x28}}]}}) 20:25:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (fail_nth: 1) 20:25:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (fail_nth: 1) [ 1120.498904] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1120.504087] RIP: 0033:0x7f4de1f650c9 [ 1120.507787] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.515492] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1120.522752] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1120.526043] FAULT_INJECTION: forcing a failure. [ 1120.526043] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.530010] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1120.530016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.530021] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1120.550721] CPU: 1 PID: 4554 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1120.571120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1120.580454] Call Trace: [ 1120.583029] dump_stack+0x1b2/0x281 [ 1120.586646] should_fail.cold+0x10a/0x149 [ 1120.590784] should_failslab+0xd6/0x130 [ 1120.594741] kmem_cache_alloc+0x28e/0x3c0 [ 1120.598877] getname_flags+0xc8/0x550 [ 1120.602664] user_path_at_empty+0x2a/0x50 [ 1120.606801] do_mount+0x118/0x2a30 [ 1120.610333] ? copy_mount_string+0x40/0x40 [ 1120.614556] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1120.619553] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1120.624378] ? copy_mnt_ns+0xa30/0xa30 [ 1120.628249] ? copy_mount_options+0x1fa/0x2f0 [ 1120.632726] ? copy_mnt_ns+0xa30/0xa30 [ 1120.636596] SyS_mount+0xa8/0x120 [ 1120.640030] ? copy_mnt_ns+0xa30/0xa30 [ 1120.643902] do_syscall_64+0x1d5/0x640 [ 1120.647784] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1120.652959] RIP: 0033:0x7f7c2b8220c9 [ 1120.656651] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.664340] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1120.671588] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1120.678836] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1120.686086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.693341] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1120.700610] CPU: 0 PID: 4569 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 1120.708403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1120.717748] Call Trace: [ 1120.720340] dump_stack+0x1b2/0x281 [ 1120.723972] should_fail.cold+0x10a/0x149 [ 1120.728119] should_failslab+0xd6/0x130 [ 1120.732097] __kmalloc_track_caller+0x2bc/0x400 [ 1120.736763] ? strndup_user+0x5b/0xf0 [ 1120.740559] memdup_user+0x22/0xa0 [ 1120.744100] strndup_user+0x5b/0xf0 [ 1120.747720] ? copy_mnt_ns+0xa30/0xa30 [ 1120.751609] SyS_mount+0x39/0x120 [ 1120.755150] ? copy_mnt_ns+0xa30/0xa30 [ 1120.759139] do_syscall_64+0x1d5/0x640 [ 1120.763029] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1120.768211] RIP: 0033:0x7f0ef47210c9 [ 1120.771917] RSP: 002b:00007f0ef2c93168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.779621] RAX: ffffffffffffffda RBX: 00007f0ef4840f80 RCX: 00007f0ef47210c9 [ 1120.786910] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1120.794174] RBP: 00007f0ef2c931d0 R08: 0000000000000000 R09: 0000000000000000 20:25:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1120.801437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1120.808701] R13: 00007ffc9e6b7f6f R14: 00007f0ef2c93300 R15: 0000000000022000 [ 1120.843375] CPU: 0 PID: 4571 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 1120.851198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1120.860551] Call Trace: [ 1120.863154] dump_stack+0x1b2/0x281 [ 1120.866785] should_fail.cold+0x10a/0x149 [ 1120.870939] should_failslab+0xd6/0x130 [ 1120.874914] __kmalloc_track_caller+0x2bc/0x400 [ 1120.879579] ? strndup_user+0x5b/0xf0 [ 1120.883430] memdup_user+0x22/0xa0 [ 1120.886970] strndup_user+0x5b/0xf0 [ 1120.890601] ? copy_mnt_ns+0xa30/0xa30 [ 1120.894488] SyS_mount+0x39/0x120 [ 1120.897939] ? copy_mnt_ns+0xa30/0xa30 [ 1120.901826] do_syscall_64+0x1d5/0x640 [ 1120.905717] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1120.910906] RIP: 0033:0x7f939655e0c9 [ 1120.914607] RSP: 002b:00007f9394ad0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.922304] RAX: ffffffffffffffda RBX: 00007f939667df80 RCX: 00007f939655e0c9 [ 1120.929566] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1120.936815] RBP: 00007f9394ad01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1120.944081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:25:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 5) 20:25:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_appraise}]}}) 20:25:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 6) 20:25:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (fail_nth: 1) 20:25:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (fail_nth: 2) 20:25:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (fail_nth: 2) [ 1120.951336] R13: 00007ffccb71f02f R14: 00007f9394ad0300 R15: 0000000000022000 20:25:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) [ 1121.054590] FAULT_INJECTION: forcing a failure. [ 1121.054590] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.069099] FAULT_INJECTION: forcing a failure. [ 1121.069099] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.084088] CPU: 0 PID: 4597 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1121.085681] FAULT_INJECTION: forcing a failure. [ 1121.085681] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.091895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.091900] Call Trace: [ 1121.091916] dump_stack+0x1b2/0x281 [ 1121.091932] should_fail.cold+0x10a/0x149 [ 1121.091944] should_failslab+0xd6/0x130 [ 1121.091958] kmem_cache_alloc+0x28e/0x3c0 [ 1121.091971] alloc_vfsmnt+0x23/0x7f0 [ 1121.091980] ? _raw_read_unlock+0x29/0x40 [ 1121.091991] vfs_kern_mount.part.0+0x27/0x470 [ 1121.092004] do_mount+0xe65/0x2a30 [ 1121.092015] ? do_raw_spin_unlock+0x164/0x220 [ 1121.092028] ? copy_mount_string+0x40/0x40 [ 1121.092041] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1121.092050] ? copy_mnt_ns+0xa30/0xa30 [ 1121.092064] ? copy_mount_options+0x1fa/0x2f0 [ 1121.155853] FAULT_INJECTION: forcing a failure. [ 1121.155853] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.160486] ? copy_mnt_ns+0xa30/0xa30 [ 1121.183846] SyS_mount+0xa8/0x120 [ 1121.187282] ? copy_mnt_ns+0xa30/0xa30 [ 1121.191159] do_syscall_64+0x1d5/0x640 [ 1121.195039] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.200209] RIP: 0033:0x7f4de1f650c9 [ 1121.203903] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.211595] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1121.218854] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1121.226109] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1121.233366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.240627] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1121.247901] CPU: 1 PID: 4599 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 1121.249770] FAULT_INJECTION: forcing a failure. [ 1121.249770] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1121.255781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.276967] Call Trace: [ 1121.279543] dump_stack+0x1b2/0x281 [ 1121.283158] should_fail.cold+0x10a/0x149 [ 1121.287308] should_failslab+0xd6/0x130 [ 1121.291266] kmem_cache_alloc+0x28e/0x3c0 [ 1121.295415] getname_flags+0xc8/0x550 [ 1121.299200] user_path_at_empty+0x2a/0x50 [ 1121.303332] do_mount+0x118/0x2a30 [ 1121.306853] ? lock_acquire+0x170/0x3f0 [ 1121.310824] ? lock_downgrade+0x740/0x740 [ 1121.314955] ? copy_mount_string+0x40/0x40 [ 1121.319171] ? __might_fault+0x177/0x1b0 [ 1121.323261] ? _copy_from_user+0x96/0x100 [ 1121.327391] ? copy_mount_options+0x1fa/0x2f0 [ 1121.331870] ? copy_mnt_ns+0xa30/0xa30 [ 1121.335747] SyS_mount+0xa8/0x120 [ 1121.339191] ? copy_mnt_ns+0xa30/0xa30 [ 1121.343069] do_syscall_64+0x1d5/0x640 [ 1121.346972] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.352154] RIP: 0033:0x7f0ef47210c9 [ 1121.355844] RSP: 002b:00007f0ef2c93168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.363532] RAX: ffffffffffffffda RBX: 00007f0ef4840f80 RCX: 00007f0ef47210c9 [ 1121.370796] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1121.378047] RBP: 00007f0ef2c931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.385295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.392543] R13: 00007ffc9e6b7f6f R14: 00007f0ef2c93300 R15: 0000000000022000 [ 1121.399822] CPU: 0 PID: 4601 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1121.407610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.416951] Call Trace: [ 1121.419554] dump_stack+0x1b2/0x281 [ 1121.423166] should_fail.cold+0x10a/0x149 [ 1121.427303] __alloc_pages_nodemask+0x21e/0x2900 [ 1121.432068] ? __lock_acquire+0x5fc/0x3f20 [ 1121.436299] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1121.441138] ? trace_hardirqs_on+0x10/0x10 [ 1121.445365] ? check_preemption_disabled+0x35/0x240 [ 1121.450374] ? __switch_to_xtra+0x93/0x1240 [ 1121.454685] ? finish_task_switch+0x178/0x610 [ 1121.459196] cache_grow_begin+0x91/0x700 [ 1121.463259] ? fs_reclaim_release+0xd0/0x110 [ 1121.467652] ? check_preemption_disabled+0x35/0x240 [ 1121.472658] cache_alloc_refill+0x273/0x350 [ 1121.476998] kmem_cache_alloc+0x333/0x3c0 [ 1121.481132] getname_flags+0xc8/0x550 [ 1121.484933] user_path_at_empty+0x2a/0x50 [ 1121.489066] do_mount+0x118/0x2a30 [ 1121.492593] ? retint_kernel+0x2d/0x2d [ 1121.496469] ? copy_mount_string+0x40/0x40 [ 1121.500711] ? copy_mount_options+0x185/0x2f0 [ 1121.505197] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 1121.510053] ? copy_mount_options+0x1fa/0x2f0 [ 1121.514618] ? copy_mnt_ns+0xa30/0xa30 [ 1121.518491] SyS_mount+0xa8/0x120 [ 1121.521931] ? copy_mnt_ns+0xa30/0xa30 [ 1121.525801] do_syscall_64+0x1d5/0x640 [ 1121.529680] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.534856] RIP: 0033:0x7f7c2b8220c9 [ 1121.538549] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.546247] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1121.553506] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1121.560760] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1121.568013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.575266] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1121.582530] CPU: 1 PID: 4600 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 1121.590320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.599700] Call Trace: [ 1121.602287] dump_stack+0x1b2/0x281 [ 1121.605929] should_fail.cold+0x10a/0x149 [ 1121.610174] should_failslab+0xd6/0x130 [ 1121.614146] kmem_cache_alloc+0x28e/0x3c0 [ 1121.618292] getname_flags+0xc8/0x550 [ 1121.622094] user_path_at_empty+0x2a/0x50 [ 1121.626241] do_mount+0x118/0x2a30 [ 1121.629951] ? lock_acquire+0x170/0x3f0 [ 1121.634012] ? lock_downgrade+0x740/0x740 [ 1121.637874] FAULT_INJECTION: forcing a failure. [ 1121.637874] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.638173] ? copy_mount_string+0x40/0x40 [ 1121.653570] ? __might_fault+0x177/0x1b0 [ 1121.657629] ? _copy_from_user+0x96/0x100 [ 1121.661769] ? copy_mount_options+0x1fa/0x2f0 [ 1121.666248] ? copy_mnt_ns+0xa30/0xa30 [ 1121.670118] SyS_mount+0xa8/0x120 [ 1121.673558] ? copy_mnt_ns+0xa30/0xa30 [ 1121.677467] do_syscall_64+0x1d5/0x640 [ 1121.681348] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.686518] RIP: 0033:0x7f939655e0c9 [ 1121.690210] RSP: 002b:00007f9394ad0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.697930] RAX: ffffffffffffffda RBX: 00007f939667df80 RCX: 00007f939655e0c9 20:25:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 1) [ 1121.705188] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1121.712437] RBP: 00007f9394ad01d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.719687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.726954] R13: 00007ffccb71f02f R14: 00007f9394ad0300 R15: 0000000000022000 [ 1121.734218] CPU: 0 PID: 4606 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1121.742015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.751363] Call Trace: [ 1121.753948] dump_stack+0x1b2/0x281 [ 1121.757573] should_fail.cold+0x10a/0x149 [ 1121.761719] should_failslab+0xd6/0x130 [ 1121.765694] __kmalloc_track_caller+0x2bc/0x400 [ 1121.770352] ? strndup_user+0x5b/0xf0 [ 1121.774137] memdup_user+0x22/0xa0 [ 1121.777660] strndup_user+0x5b/0xf0 [ 1121.781271] ? copy_mnt_ns+0xa30/0xa30 [ 1121.785171] SyS_mount+0x39/0x120 [ 1121.788605] ? copy_mnt_ns+0xa30/0xa30 [ 1121.792484] do_syscall_64+0x1d5/0x640 [ 1121.796366] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.801566] RIP: 0033:0x7fafe255f0c9 [ 1121.805264] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.812958] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1121.820230] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1121.827481] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1121.834729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.841984] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1121.849255] CPU: 1 PID: 4598 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 1121.857046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.866393] Call Trace: [ 1121.868983] dump_stack+0x1b2/0x281 [ 1121.872619] should_fail.cold+0x10a/0x149 [ 1121.876798] should_failslab+0xd6/0x130 [ 1121.880782] __kmalloc_track_caller+0x2bc/0x400 [ 1121.885627] ? strndup_user+0x5b/0xf0 [ 1121.889430] memdup_user+0x22/0xa0 [ 1121.892969] strndup_user+0x5b/0xf0 [ 1121.896592] ? copy_mnt_ns+0xa30/0xa30 [ 1121.900590] SyS_mount+0x39/0x120 [ 1121.904044] ? copy_mnt_ns+0xa30/0xa30 [ 1121.907934] do_syscall_64+0x1d5/0x640 [ 1121.911832] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1121.916779] FAULT_INJECTION: forcing a failure. [ 1121.916779] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1121.917049] RIP: 0033:0x7fc24c3750c9 [ 1121.932612] RSP: 002b:00007fc24a8e7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1121.940309] RAX: ffffffffffffffda RBX: 00007fc24c494f80 RCX: 00007fc24c3750c9 [ 1121.947564] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000000 20:25:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 7) 20:25:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 6) [ 1121.954822] RBP: 00007fc24a8e71d0 R08: 0000000000000000 R09: 0000000000000000 [ 1121.962073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1121.969327] R13: 00007ffe9f02066f R14: 00007fc24a8e7300 R15: 0000000000022000 [ 1121.976594] CPU: 0 PID: 4611 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1121.984387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1121.993736] Call Trace: [ 1121.996326] dump_stack+0x1b2/0x281 [ 1121.999962] should_fail.cold+0x10a/0x149 [ 1122.004110] __alloc_pages_nodemask+0x21e/0x2900 [ 1122.008865] ? pcpu_alloc+0x8e8/0xf50 [ 1122.012669] ? pcpu_alloc+0xbe0/0xf50 [ 1122.016474] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1122.021329] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1122.026783] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.031807] alloc_pages_current+0x155/0x260 [ 1122.033184] FAULT_INJECTION: forcing a failure. [ 1122.033184] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.036212] ? __lockdep_init_map+0x100/0x560 [ 1122.036224] get_zeroed_page+0x19/0x50 [ 1122.036237] mount_fs+0x1c7/0x2a0 [ 1122.059225] vfs_kern_mount.part.0+0x5b/0x470 [ 1122.063711] do_mount+0xe65/0x2a30 [ 1122.067240] ? copy_mount_string+0x40/0x40 [ 1122.071459] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.076459] ? copy_mnt_ns+0xa30/0xa30 [ 1122.080347] ? copy_mount_options+0x1fa/0x2f0 [ 1122.084824] ? copy_mnt_ns+0xa30/0xa30 [ 1122.088695] SyS_mount+0xa8/0x120 [ 1122.092131] ? copy_mnt_ns+0xa30/0xa30 [ 1122.096004] do_syscall_64+0x1d5/0x640 [ 1122.099884] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1122.105060] RIP: 0033:0x7f4de1f650c9 [ 1122.108758] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1122.116466] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1122.123733] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1122.131006] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1122.138281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.145546] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1122.152835] CPU: 1 PID: 4615 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1122.160634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1122.169988] Call Trace: [ 1122.172582] dump_stack+0x1b2/0x281 [ 1122.176245] should_fail.cold+0x10a/0x149 [ 1122.180399] should_failslab+0xd6/0x130 [ 1122.184379] kmem_cache_alloc+0x28e/0x3c0 [ 1122.188539] alloc_vfsmnt+0x23/0x7f0 [ 1122.192253] ? _raw_read_unlock+0x29/0x40 [ 1122.196401] vfs_kern_mount.part.0+0x27/0x470 [ 1122.200897] do_mount+0xe65/0x2a30 [ 1122.204438] ? do_raw_spin_unlock+0x164/0x220 [ 1122.208940] ? copy_mount_string+0x40/0x40 [ 1122.213178] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.218195] ? copy_mnt_ns+0xa30/0xa30 [ 1122.222080] ? copy_mount_options+0x1fa/0x2f0 [ 1122.226575] ? copy_mnt_ns+0xa30/0xa30 [ 1122.230461] SyS_mount+0xa8/0x120 [ 1122.233915] ? copy_mnt_ns+0xa30/0xa30 [ 1122.237801] do_syscall_64+0x1d5/0x640 [ 1122.241691] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1122.246874] RIP: 0033:0x7f7c2b8220c9 [ 1122.250573] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:25:32 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) mkdirat(r0, &(0x7f0000001040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x20) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\x00') ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x1, 0xffffffff, 0x8000, 0x4, 0x1a, 0x5}) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 2) 20:25:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 8) 20:25:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1122.258282] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1122.260923] FAULT_INJECTION: forcing a failure. [ 1122.260923] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.265545] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1122.265551] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1122.265556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.265561] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:32 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) mkdirat(r0, &(0x7f0000001040)='./file0\x00', 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x20) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\x00') (async) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x1, 0xffffffff, 0x8000, 0x4, 0x1a, 0x5}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1122.345561] FAULT_INJECTION: forcing a failure. [ 1122.345561] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.365414] CPU: 0 PID: 4626 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1122.373241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1122.382596] Call Trace: [ 1122.385184] dump_stack+0x1b2/0x281 [ 1122.388816] should_fail.cold+0x10a/0x149 20:25:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1122.392963] should_failslab+0xd6/0x130 [ 1122.396939] kmem_cache_alloc+0x28e/0x3c0 [ 1122.401090] getname_kernel+0x4e/0x340 [ 1122.404979] kern_path+0x1b/0x40 [ 1122.408350] lookup_bdev+0xc6/0x1c0 [ 1122.411972] ? bd_acquire+0x440/0x440 [ 1122.415775] blkdev_get_by_path+0x1b/0xa0 [ 1122.419924] mount_bdev+0x4c/0x360 [ 1122.423551] ? fuse_get_root_inode+0xc0/0xc0 [ 1122.427960] mount_fs+0x92/0x2a0 [ 1122.431332] vfs_kern_mount.part.0+0x5b/0x470 [ 1122.435823] do_mount+0xe65/0x2a30 [ 1122.439368] ? copy_mount_string+0x40/0x40 20:25:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1122.443602] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.448617] ? copy_mnt_ns+0xa30/0xa30 [ 1122.452506] ? copy_mount_options+0x1fa/0x2f0 [ 1122.456997] ? copy_mnt_ns+0xa30/0xa30 [ 1122.460884] SyS_mount+0xa8/0x120 [ 1122.464330] ? copy_mnt_ns+0xa30/0xa30 [ 1122.468213] do_syscall_64+0x1d5/0x640 [ 1122.472101] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1122.477282] RIP: 0033:0x7f4de1f650c9 [ 1122.480976] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1122.488670] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 20:25:32 executing program 4: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x4) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) mkdirat(r0, &(0x7f0000001040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x20) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\x00') ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x1, 0xffffffff, 0x8000, 0x4, 0x1a, 0x5}) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x4) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) mkdirat(r0, &(0x7f0000001040)='./file0\x00', 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x20) (async) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\x00') (async) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000140)={0x1, 0xffffffff, 0x8000, 0x4, 0x1a, 0x5}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1122.495933] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1122.503193] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1122.510462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.517749] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1122.526749] CPU: 1 PID: 4621 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1122.534548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1122.543902] Call Trace: [ 1122.546487] dump_stack+0x1b2/0x281 [ 1122.550123] should_fail.cold+0x10a/0x149 [ 1122.554273] should_failslab+0xd6/0x130 [ 1122.558257] __kmalloc_track_caller+0x2bc/0x400 [ 1122.562927] ? strndup_user+0x5b/0xf0 [ 1122.566754] memdup_user+0x22/0xa0 [ 1122.570295] strndup_user+0x5b/0xf0 [ 1122.573924] ? copy_mnt_ns+0xa30/0xa30 [ 1122.577806] SyS_mount+0x68/0x120 [ 1122.581257] ? copy_mnt_ns+0xa30/0xa30 [ 1122.585146] do_syscall_64+0x1d5/0x640 [ 1122.589035] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 20:25:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 9) 20:25:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 7) 20:25:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) 20:25:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x4000, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_rxfh={0x47, 0x5, 0xfffffffe, 0x2a9, 0x4, "ff0c73", 0x9, [0x3, 0x4, 0x7, 0xcb858107, 0x6, 0x1, 0x8, 0x95d, 0x3f, 0xfff]}}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x2) setxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="75736562774c69703646da3232fe"], &(0x7f0000000240)='@\':\x00', 0x4, 0x0) [ 1122.594219] RIP: 0033:0x7fafe255f0c9 [ 1122.597921] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1122.605623] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1122.612883] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1122.620145] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1122.627407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.634674] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 20:25:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 3) 20:25:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x2002001, 0x0) [ 1122.688610] FAULT_INJECTION: forcing a failure. [ 1122.688610] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.708051] FAULT_INJECTION: forcing a failure. [ 1122.708051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1122.715255] CPU: 1 PID: 4665 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1122.727672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1122.737020] Call Trace: [ 1122.739604] dump_stack+0x1b2/0x281 [ 1122.743237] should_fail.cold+0x10a/0x149 [ 1122.747387] should_failslab+0xd6/0x130 [ 1122.751364] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1122.756035] ? set_bdev_super+0x110/0x110 [ 1122.760179] sget_userns+0x102/0xc10 [ 1122.763888] ? set_bdev_super+0x110/0x110 [ 1122.768032] ? ns_test_super+0x50/0x50 [ 1122.771910] ? set_bdev_super+0x110/0x110 [ 1122.776050] ? ns_test_super+0x50/0x50 [ 1122.779931] sget+0xd1/0x110 [ 1122.782947] mount_bdev+0xcd/0x360 [ 1122.786475] ? fuse_get_root_inode+0xc0/0xc0 [ 1122.790876] mount_fs+0x92/0x2a0 [ 1122.792439] FAULT_INJECTION: forcing a failure. [ 1122.792439] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.794240] vfs_kern_mount.part.0+0x5b/0x470 [ 1122.794254] do_mount+0xe65/0x2a30 [ 1122.794276] ? copy_mount_string+0x40/0x40 [ 1122.794288] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.794302] ? copy_mnt_ns+0xa30/0xa30 [ 1122.826548] ? copy_mount_options+0x1fa/0x2f0 [ 1122.831046] ? copy_mnt_ns+0xa30/0xa30 [ 1122.834935] SyS_mount+0xa8/0x120 [ 1122.838382] ? copy_mnt_ns+0xa30/0xa30 [ 1122.842264] do_syscall_64+0x1d5/0x640 [ 1122.846142] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1122.851313] RIP: 0033:0x7f4de1f650c9 [ 1122.855001] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1122.862692] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1122.869945] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1122.877197] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 20:25:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) [ 1122.884450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.891784] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1122.899079] CPU: 0 PID: 4664 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1122.906874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1122.916227] Call Trace: [ 1122.918813] dump_stack+0x1b2/0x281 [ 1122.922447] should_fail.cold+0x10a/0x149 [ 1122.926597] __alloc_pages_nodemask+0x21e/0x2900 [ 1122.931351] ? pcpu_alloc+0x8e8/0xf50 [ 1122.935154] ? pcpu_alloc+0xbe0/0xf50 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async, rerun: 64) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x2002001, 0x0) (rerun: 64) [ 1122.938960] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1122.943825] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1122.949274] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.954292] alloc_pages_current+0x155/0x260 [ 1122.958699] ? __lockdep_init_map+0x100/0x560 [ 1122.963187] get_zeroed_page+0x19/0x50 [ 1122.967068] mount_fs+0x1c7/0x2a0 [ 1122.970517] vfs_kern_mount.part.0+0x5b/0x470 [ 1122.975007] do_mount+0xe65/0x2a30 [ 1122.978539] ? copy_mount_string+0x40/0x40 [ 1122.982759] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1122.987758] ? copy_mnt_ns+0xa30/0xa30 [ 1122.991634] ? copy_mount_options+0x1fa/0x2f0 [ 1122.996134] ? copy_mnt_ns+0xa30/0xa30 [ 1123.000007] SyS_mount+0xa8/0x120 [ 1123.003442] ? copy_mnt_ns+0xa30/0xa30 [ 1123.007329] do_syscall_64+0x1d5/0x640 [ 1123.011209] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.016380] RIP: 0033:0x7f7c2b8220c9 [ 1123.020113] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.027810] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040), 0x2002001, 0x0) [ 1123.035071] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.042334] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.049594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.056859] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1123.069723] CPU: 1 PID: 4677 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1123.077543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1123.086893] Call Trace: [ 1123.089519] dump_stack+0x1b2/0x281 [ 1123.093150] should_fail.cold+0x10a/0x149 [ 1123.097310] should_failslab+0xd6/0x130 [ 1123.101292] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1123.105961] ? copy_mnt_ns+0xa30/0xa30 [ 1123.109849] copy_mount_options+0x59/0x2f0 [ 1123.114082] ? copy_mnt_ns+0xa30/0xa30 [ 1123.117974] SyS_mount+0x84/0x120 [ 1123.121430] ? copy_mnt_ns+0xa30/0xa30 [ 1123.125314] do_syscall_64+0x1d5/0x640 [ 1123.129208] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.134390] RIP: 0033:0x7fafe255f0c9 20:25:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 10) 20:25:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 20:25:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 8) [ 1123.138095] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.145801] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1123.153073] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.160341] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.167610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.174879] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1123.179509] FAULT_INJECTION: forcing a failure. [ 1123.179509] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1123.193939] CPU: 0 PID: 4692 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1123.201728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1123.211081] Call Trace: [ 1123.213676] dump_stack+0x1b2/0x281 [ 1123.217316] should_fail.cold+0x10a/0x149 [ 1123.221465] ? get_page_from_freelist+0xaf6/0x25a0 [ 1123.226398] __alloc_pages_nodemask+0x21e/0x2900 [ 1123.231162] ? lock_downgrade+0x740/0x740 [ 1123.235313] ? __lock_acquire+0x5fc/0x3f20 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x9a679a29a8b270c2}}], [{@appraise_type}, {@obj_type={'obj_type', 0x3d, '/('}}, {@measure}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfshat={'smackfshat', 0x3d, 'fuseblk\x00'}}]}}) [ 1123.239551] ? preempt_count_add+0xaf/0x170 [ 1123.243879] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1123.248749] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1123.254206] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.259222] ? __alloc_pages_nodemask+0x1a8b/0x2900 [ 1123.264240] cache_grow_begin+0x91/0x700 [ 1123.268297] ? fs_reclaim_release+0xd0/0x110 [ 1123.272702] ? check_preemption_disabled+0x35/0x240 [ 1123.277728] cache_alloc_refill+0x273/0x350 [ 1123.282056] kmem_cache_alloc+0x333/0x3c0 [ 1123.286641] getname_kernel+0x4e/0x340 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x9a679a29a8b270c2}}], [{@appraise_type}, {@obj_type={'obj_type', 0x3d, '/('}}, {@measure}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfshat={'smackfshat', 0x3d, 'fuseblk\x00'}}]}}) [ 1123.290530] kern_path+0x1b/0x40 [ 1123.293896] lookup_bdev+0xc6/0x1c0 [ 1123.297524] ? bd_acquire+0x440/0x440 [ 1123.301319] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1123.306769] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.311873] blkdev_get_by_path+0x1b/0xa0 [ 1123.316024] mount_bdev+0x4c/0x360 [ 1123.319557] ? fuse_get_root_inode+0xc0/0xc0 [ 1123.323969] mount_fs+0x92/0x2a0 [ 1123.327342] vfs_kern_mount.part.0+0x5b/0x470 [ 1123.331844] do_mount+0xe65/0x2a30 [ 1123.335393] ? copy_mount_string+0x40/0x40 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x9a679a29a8b270c2}}], [{@appraise_type}, {@obj_type={'obj_type', 0x3d, '/('}}, {@measure}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfshat={'smackfshat', 0x3d, 'fuseblk\x00'}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x9a679a29a8b270c2}}], [{@appraise_type}, {@obj_type={'obj_type', 0x3d, '/('}}, {@measure}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfshat={'smackfshat', 0x3d, 'fuseblk\x00'}}]}}) (async) [ 1123.339627] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.344641] ? copy_mnt_ns+0xa30/0xa30 [ 1123.348529] ? copy_mount_options+0x1fa/0x2f0 [ 1123.350901] FAULT_INJECTION: forcing a failure. [ 1123.350901] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1123.353046] ? copy_mnt_ns+0xa30/0xa30 [ 1123.368700] SyS_mount+0xa8/0x120 [ 1123.372150] ? copy_mnt_ns+0xa30/0xa30 [ 1123.376041] do_syscall_64+0x1d5/0x640 [ 1123.379927] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.385100] RIP: 0033:0x7f4de1f650c9 [ 1123.388811] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.396503] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1123.403764] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.411024] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.418286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1123.425544] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 [ 1123.432815] CPU: 1 PID: 4693 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1123.440612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1123.449987] Call Trace: [ 1123.452569] dump_stack+0x1b2/0x281 [ 1123.456199] should_fail.cold+0x10a/0x149 [ 1123.460348] __alloc_pages_nodemask+0x21e/0x2900 [ 1123.465101] ? pcpu_alloc+0x8e8/0xf50 [ 1123.468908] ? pcpu_alloc+0xbe0/0xf50 [ 1123.472714] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1123.477566] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1123.483019] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.488041] alloc_pages_current+0x155/0x260 [ 1123.492450] ? __lockdep_init_map+0x100/0x560 [ 1123.496944] get_zeroed_page+0x19/0x50 [ 1123.500833] mount_fs+0x1c7/0x2a0 [ 1123.504289] vfs_kern_mount.part.0+0x5b/0x470 [ 1123.508787] do_mount+0xe65/0x2a30 [ 1123.512328] ? copy_mount_string+0x40/0x40 [ 1123.516660] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.521674] ? copy_mnt_ns+0xa30/0xa30 [ 1123.525558] ? copy_mount_options+0x1fa/0x2f0 [ 1123.530050] ? copy_mnt_ns+0xa30/0xa30 [ 1123.533937] SyS_mount+0xa8/0x120 [ 1123.537408] ? copy_mnt_ns+0xa30/0xa30 20:25:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x4000, 0x0, 0x0) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_rxfh={0x47, 0x5, 0xfffffffe, 0x2a9, 0x4, "ff0c73", 0x9, [0x3, 0x4, 0x7, 0xcb858107, 0x6, 0x1, 0x8, 0x95d, 0x3f, 0xfff]}}) (async) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x2) setxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="75736562774c69703646da3232fe"], &(0x7f0000000240)='@\':\x00', 0x4, 0x0) 20:25:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) 20:25:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 4) 20:25:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 11) [ 1123.541302] do_syscall_64+0x1d5/0x640 [ 1123.545189] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.550371] RIP: 0033:0x7f7c2b8220c9 [ 1123.554069] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.561777] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1123.569048] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.576311] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.583573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:25:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1, 0x5394) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000001800002e2f666905000000"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x680, 0x110) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) setsockopt(r1, 0x3, 0x627, &(0x7f0000000300)="884684c6ef34d79fd9a0824e6c1686830056aca77324b25ea62560a9386dd462cd9a6ed8ca08747795c3fe5466346649b2831beab25b02b0458e616ecdf6a18933b21172e4bbb8455404", 0x4a) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/128, 0x80}, &(0x7f0000000200), 0x48}, 0x20) socketpair(0x18, 0xa, 0x5, &(0x7f0000000380)) 20:25:33 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x77e, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1123.588971] FAULT_INJECTION: forcing a failure. [ 1123.588971] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.590863] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1123.628239] FAULT_INJECTION: forcing a failure. [ 1123.628239] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.657813] CPU: 1 PID: 4721 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1123.665720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1123.675071] Call Trace: [ 1123.677657] dump_stack+0x1b2/0x281 [ 1123.681289] should_fail.cold+0x10a/0x149 [ 1123.685430] should_failslab+0xd6/0x130 [ 1123.689401] kmem_cache_alloc+0x28e/0x3c0 [ 1123.693552] getname_flags+0xc8/0x550 [ 1123.697383] user_path_at_empty+0x2a/0x50 [ 1123.701561] do_mount+0x118/0x2a30 [ 1123.705118] ? copy_mount_string+0x40/0x40 [ 1123.709354] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.714370] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1123.719218] ? copy_mnt_ns+0xa30/0xa30 [ 1123.723103] ? copy_mount_options+0x1fa/0x2f0 [ 1123.727593] ? copy_mnt_ns+0xa30/0xa30 [ 1123.731480] SyS_mount+0xa8/0x120 [ 1123.734930] ? copy_mnt_ns+0xa30/0xa30 [ 1123.738815] do_syscall_64+0x1d5/0x640 [ 1123.742709] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.748061] RIP: 0033:0x7fafe255f0c9 20:25:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) (rerun: 32) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x4000, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000140)=@ethtool_rxfh={0x47, 0x5, 0xfffffffe, 0x2a9, 0x4, "ff0c73", 0x9, [0x3, 0x4, 0x7, 0xcb858107, 0x6, 0x1, 0x8, 0x95d, 0x3f, 0xfff]}}) (async) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x2) (async) setxattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="75736562774c69703646da3232fe"], &(0x7f0000000240)='@\':\x00', 0x4, 0x0) 20:25:33 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x77e, 0x4) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1123.751757] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.759451] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1123.766711] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.773966] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.781223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1123.788489] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1123.795790] CPU: 0 PID: 4714 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 1123.803587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1123.812932] Call Trace: [ 1123.815519] dump_stack+0x1b2/0x281 [ 1123.819147] should_fail.cold+0x10a/0x149 [ 1123.823293] should_failslab+0xd6/0x130 [ 1123.827272] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1123.832205] ? set_bdev_super+0x110/0x110 [ 1123.836347] sget_userns+0x102/0xc10 [ 1123.840067] ? set_bdev_super+0x110/0x110 [ 1123.844212] ? ns_test_super+0x50/0x50 [ 1123.848134] ? set_bdev_super+0x110/0x110 [ 1123.852281] ? ns_test_super+0x50/0x50 [ 1123.856168] sget+0xd1/0x110 [ 1123.859190] mount_bdev+0xcd/0x360 [ 1123.862724] ? fuse_get_root_inode+0xc0/0xc0 [ 1123.867129] mount_fs+0x92/0x2a0 [ 1123.870494] vfs_kern_mount.part.0+0x5b/0x470 [ 1123.875002] do_mount+0xe65/0x2a30 [ 1123.878548] ? copy_mount_string+0x40/0x40 [ 1123.882783] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1123.887789] ? copy_mnt_ns+0xa30/0xa30 [ 1123.891669] ? copy_mount_options+0x1fa/0x2f0 [ 1123.896152] ? copy_mnt_ns+0xa30/0xa30 [ 1123.900020] SyS_mount+0xa8/0x120 [ 1123.903451] ? copy_mnt_ns+0xa30/0xa30 [ 1123.907315] do_syscall_64+0x1d5/0x640 [ 1123.911201] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1123.916392] RIP: 0033:0x7f4de1f650c9 [ 1123.920081] RSP: 002b:00007f4de04d7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.927783] RAX: ffffffffffffffda RBX: 00007f4de2084f80 RCX: 00007f4de1f650c9 [ 1123.935053] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1123.942299] RBP: 00007f4de04d71d0 R08: 0000000020000280 R09: 0000000000000000 [ 1123.949545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 20:25:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 9) 20:25:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1, 0x5394) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000001800002e2f666905000000"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x680, 0x110) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) setsockopt(r1, 0x3, 0x627, &(0x7f0000000300)="884684c6ef34d79fd9a0824e6c1686830056aca77324b25ea62560a9386dd462cd9a6ed8ca08747795c3fe5466346649b2831beab25b02b0458e616ecdf6a18933b21172e4bbb8455404", 0x4a) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/128, 0x80}, &(0x7f0000000200), 0x48}, 0x20) socketpair(0x18, 0xa, 0x5, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1, 0x5394) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000001800002e2f666905000000"]) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) openat(r1, &(0x7f0000000080)='./file0\x00', 0x680, 0x110) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) (async) setsockopt(r1, 0x3, 0x627, &(0x7f0000000300)="884684c6ef34d79fd9a0824e6c1686830056aca77324b25ea62560a9386dd462cd9a6ed8ca08747795c3fe5466346649b2831beab25b02b0458e616ecdf6a18933b21172e4bbb8455404", 0x4a) (async) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) (async) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) (async) socket$rds(0x15, 0x5, 0x0) (async) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/128, 0x80}, &(0x7f0000000200), 0x48}, 0x20) (async) socketpair(0x18, 0xa, 0x5, &(0x7f0000000380)) (async) 20:25:34 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x77e, 0x4) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 5) 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) uselib(&(0x7f0000000000)='./file0\x00') [ 1123.956797] R13: 00007ffd5584b64f R14: 00007f4de04d7300 R15: 0000000000022000 20:25:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 12) [ 1124.056752] FAULT_INJECTION: forcing a failure. [ 1124.056752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.068576] CPU: 0 PID: 4748 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1124.075428] FAULT_INJECTION: forcing a failure. [ 1124.075428] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.076364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1124.076368] Call Trace: [ 1124.076383] dump_stack+0x1b2/0x281 [ 1124.076405] should_fail.cold+0x10a/0x149 [ 1124.107231] __alloc_pages_nodemask+0x21e/0x2900 [ 1124.111988] ? deref_stack_reg+0x124/0x1a0 [ 1124.116223] ? is_bpf_text_address+0x91/0x150 [ 1124.120809] ? __lock_acquire+0x5fc/0x3f20 [ 1124.125048] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1124.129894] ? kernel_text_address+0xbd/0xf0 [ 1124.134302] ? __kernel_text_address+0x9/0x30 [ 1124.138802] ? depot_save_stack+0x10d/0x3f0 [ 1124.143122] ? kasan_kmalloc+0x139/0x160 [ 1124.147187] cache_grow_begin+0x91/0x700 [ 1124.151245] ? fs_reclaim_release+0xd0/0x110 [ 1124.155650] ? check_preemption_disabled+0x35/0x240 [ 1124.160659] cache_alloc_refill+0x273/0x350 [ 1124.164976] kmem_cache_alloc+0x333/0x3c0 [ 1124.169118] getname_flags+0xc8/0x550 [ 1124.172922] user_path_at_empty+0x2a/0x50 [ 1124.177070] do_mount+0x118/0x2a30 [ 1124.180614] ? copy_mount_string+0x40/0x40 [ 1124.184841] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.190021] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 1124.194847] ? copy_mnt_ns+0xa30/0xa30 [ 1124.198718] ? copy_mount_options+0x1fa/0x2f0 [ 1124.203193] ? copy_mnt_ns+0xa30/0xa30 [ 1124.207086] SyS_mount+0xa8/0x120 [ 1124.210523] ? copy_mnt_ns+0xa30/0xa30 [ 1124.214398] do_syscall_64+0x1d5/0x640 [ 1124.218272] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1124.223445] RIP: 0033:0x7fafe255f0c9 [ 1124.227138] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1124.234831] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1124.242089] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1124.249344] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 20:25:34 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001080)={&(0x7f0000001040)='./file0\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000001340)={0x1000, 0x1, 0xffff, 0x81, 0x0, [0x32e, 0x2, 0x1, 0x800], [0x101, 0x80000001, 0x9, 0x6], [0x10000, 0xed14, 0x401, 0x1], [0x6, 0x4, 0x10001, 0x5]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001200)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x60, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x10000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x14}, 0x4001) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0x40, 0x6, "9b093d41d9d09d5d9af8938736428658146b658b540b3cf81917c9a5614d49df85eb2e74e3468bbf4aabeb939b84ac2f508f6ea4045efbe6ee99c59f9f9641725c8bb3b0d8e2cd8c50461885994e96cad6b990bbd2d6d7c89d3b92562d8184d48cd1178b6c8544b76a8334173df9e7f3d783a8c44cf352283e1415e50c1fac7c5cfb251989fe1615e678b34134764311"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1124.256597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.263850] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1124.299704] CPU: 1 PID: 4753 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1124.307515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1124.316864] Call Trace: [ 1124.319447] dump_stack+0x1b2/0x281 [ 1124.323078] should_fail.cold+0x10a/0x149 [ 1124.327228] should_failslab+0xd6/0x130 [ 1124.331203] kmem_cache_alloc+0x28e/0x3c0 [ 1124.335528] getname_kernel+0x4e/0x340 [ 1124.339436] kern_path+0x1b/0x40 [ 1124.342801] lookup_bdev+0xc6/0x1c0 [ 1124.346422] ? bd_acquire+0x440/0x440 [ 1124.350217] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1124.355668] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.360680] blkdev_get_by_path+0x1b/0xa0 [ 1124.364822] mount_bdev+0x4c/0x360 [ 1124.368356] ? fuse_get_root_inode+0xc0/0xc0 [ 1124.372758] mount_fs+0x92/0x2a0 [ 1124.376123] vfs_kern_mount.part.0+0x5b/0x470 [ 1124.380638] do_mount+0xe65/0x2a30 [ 1124.384184] ? copy_mount_string+0x40/0x40 [ 1124.388415] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.393427] ? copy_mnt_ns+0xa30/0xa30 [ 1124.397308] ? copy_mount_options+0x1fa/0x2f0 [ 1124.401893] ? copy_mnt_ns+0xa30/0xa30 [ 1124.405776] SyS_mount+0xa8/0x120 [ 1124.409222] ? copy_mnt_ns+0xa30/0xa30 [ 1124.413133] do_syscall_64+0x1d5/0x640 [ 1124.417025] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1124.422224] RIP: 0033:0x7f7c2b8220c9 [ 1124.425926] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1124.433633] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1124.440904] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) uselib(&(0x7f0000000000)='./file0\x00') 20:25:34 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) (rerun: 64) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001080)={&(0x7f0000001040)='./file0\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000001340)={0x1000, 0x1, 0xffff, 0x81, 0x0, [0x32e, 0x2, 0x1, 0x800], [0x101, 0x80000001, 0x9, 0x6], [0x10000, 0xed14, 0x401, 0x1], [0x6, 0x4, 0x10001, 0x5]}) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async, rerun: 32) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001200)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x60, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x10000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x14}, 0x4001) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0x40, 0x6, "9b093d41d9d09d5d9af8938736428658146b658b540b3cf81917c9a5614d49df85eb2e74e3468bbf4aabeb939b84ac2f508f6ea4045efbe6ee99c59f9f9641725c8bb3b0d8e2cd8c50461885994e96cad6b990bbd2d6d7c89d3b92562d8184d48cd1178b6c8544b76a8334173df9e7f3d783a8c44cf352283e1415e50c1fac7c5cfb251989fe1615e678b34134764311"}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async, rerun: 64) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (rerun: 64) 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)="6cdee6959148b231f47fe1d59ba2fd4be2c1310e89d42b978c947d175c325b5cbd2f754444313867c389606968fc82f980036d4264c0039f5f56f1e0bb8e325ec26254dbb89843d70f35a80c6c4426efba646478e4c16b57587b9483d4a528b74f6f4a6fdde7007798ac32f53e93abae6399088f2e1caa2f51b4feaa7b234f0ed0a71f809ca174394d9f15ffaca49cbc390f8cacdd0d9e8a4b95280249a400"/168, 0xa8, 0x3) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:34 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001080)={&(0x7f0000001040)='./file0\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000001340)={0x1000, 0x1, 0xffff, 0x81, 0x0, [0x32e, 0x2, 0x1, 0x800], [0x101, 0x80000001, 0x9, 0x6], [0x10000, 0xed14, 0x401, 0x1], [0x6, 0x4, 0x10001, 0x5]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001200)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x60, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x10000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x14}, 0x4001) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0x40, 0x6, "9b093d41d9d09d5d9af8938736428658146b658b540b3cf81917c9a5614d49df85eb2e74e3468bbf4aabeb939b84ac2f508f6ea4045efbe6ee99c59f9f9641725c8bb3b0d8e2cd8c50461885994e96cad6b990bbd2d6d7c89d3b92562d8184d48cd1178b6c8544b76a8334173df9e7f3d783a8c44cf352283e1415e50c1fac7c5cfb251989fe1615e678b34134764311"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/4096) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001080)={&(0x7f0000001040)='./file0\x00', r1}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}}, 0x0) (async) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000001340)={0x1000, 0x1, 0xffff, 0x81, 0x0, [0x32e, 0x2, 0x1, 0x800], [0x101, 0x80000001, 0x9, 0x6], [0x10000, 0xed14, 0x401, 0x1], [0x6, 0x4, 0x10001, 0x5]}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r4, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="8f0229bd7000fedbdf250c"], 0x4c}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001100)) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000001200)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)={0x60, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x10000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x14}, 0x4001) (async) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0x40, 0x6, "9b093d41d9d09d5d9af8938736428658146b658b540b3cf81917c9a5614d49df85eb2e74e3468bbf4aabeb939b84ac2f508f6ea4045efbe6ee99c59f9f9641725c8bb3b0d8e2cd8c50461885994e96cad6b990bbd2d6d7c89d3b92562d8184d48cd1178b6c8544b76a8334173df9e7f3d783a8c44cf352283e1415e50c1fac7c5cfb251989fe1615e678b34134764311"}) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1124.448167] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1124.455432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.462691] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 10) 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)="6cdee6959148b231f47fe1d59ba2fd4be2c1310e89d42b978c947d175c325b5cbd2f754444313867c389606968fc82f980036d4264c0039f5f56f1e0bb8e325ec26254dbb89843d70f35a80c6c4426efba646478e4c16b57587b9483d4a528b74f6f4a6fdde7007798ac32f53e93abae6399088f2e1caa2f51b4feaa7b234f0ed0a71f809ca174394d9f15ffaca49cbc390f8cacdd0d9e8a4b95280249a400"/168, 0xa8, 0x3) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 6) 20:25:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'team0\x00', &(0x7f0000000140)=@ethtool_channels={0x3d, 0x1, 0x2, 0x7f, 0x81, 0x6, 0xbdc, 0x81, 0x1}}) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc484, 0x0) 20:25:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1, 0x5394) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000001800002e2f666905000000"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x680, 0x110) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) setsockopt(r1, 0x3, 0x627, &(0x7f0000000300)="884684c6ef34d79fd9a0824e6c1686830056aca77324b25ea62560a9386dd462cd9a6ed8ca08747795c3fe5466346649b2831beab25b02b0458e616ecdf6a18933b21172e4bbb8455404", 0x4a) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/128, 0x80}, &(0x7f0000000200), 0x48}, 0x20) socketpair(0x18, 0xa, 0x5, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', 0x1, 0x5394) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000001800002e2f666905000000"]) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r1, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) openat(r1, &(0x7f0000000080)='./file0\x00', 0x680, 0x110) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) (async) setsockopt(r1, 0x3, 0x627, &(0x7f0000000300)="884684c6ef34d79fd9a0824e6c1686830056aca77324b25ea62560a9386dd462cd9a6ed8ca08747795c3fe5466346649b2831beab25b02b0458e616ecdf6a18933b21172e4bbb8455404", 0x4a) (async) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x4) (async) statx(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) (async) socket$rds(0x15, 0x5, 0x0) (async) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000180)=""/128, 0x80}, &(0x7f0000000200), 0x48}, 0x20) (async) socketpair(0x18, 0xa, 0x5, &(0x7f0000000380)) (async) 20:25:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff, 0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) 20:25:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140), &(0x7f00000001c0)="6cdee6959148b231f47fe1d59ba2fd4be2c1310e89d42b978c947d175c325b5cbd2f754444313867c389606968fc82f980036d4264c0039f5f56f1e0bb8e325ec26254dbb89843d70f35a80c6c4426efba646478e4c16b57587b9483d4a528b74f6f4a6fdde7007798ac32f53e93abae6399088f2e1caa2f51b4feaa7b234f0ed0a71f809ca174394d9f15ffaca49cbc390f8cacdd0d9e8a4b95280249a400"/168, 0xa8, 0x3) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1124.576857] FAULT_INJECTION: forcing a failure. [ 1124.576857] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.602611] FAULT_INJECTION: forcing a failure. [ 1124.602611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.603790] CPU: 0 PID: 4824 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1124.622237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1124.631577] Call Trace: [ 1124.634175] dump_stack+0x1b2/0x281 [ 1124.637789] should_fail.cold+0x10a/0x149 [ 1124.641923] should_failslab+0xd6/0x130 [ 1124.645880] kmem_cache_alloc+0x28e/0x3c0 [ 1124.650014] alloc_vfsmnt+0x23/0x7f0 [ 1124.653708] ? _raw_read_unlock+0x29/0x40 [ 1124.657836] vfs_kern_mount.part.0+0x27/0x470 [ 1124.662317] do_mount+0xe65/0x2a30 [ 1124.665844] ? copy_mount_string+0x40/0x40 [ 1124.670066] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.675079] ? copy_mnt_ns+0xa30/0xa30 [ 1124.678949] ? copy_mount_options+0x1fa/0x2f0 [ 1124.683425] ? copy_mnt_ns+0xa30/0xa30 [ 1124.687295] SyS_mount+0xa8/0x120 [ 1124.690727] ? copy_mnt_ns+0xa30/0xa30 [ 1124.694596] do_syscall_64+0x1d5/0x640 [ 1124.698468] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1124.703636] RIP: 0033:0x7fafe255f0c9 [ 1124.707325] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1124.715015] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1124.722281] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1124.729530] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1124.736795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1124.744047] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1124.751310] CPU: 1 PID: 4828 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1124.759099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1124.768443] Call Trace: [ 1124.771028] dump_stack+0x1b2/0x281 20:25:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 7) 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1124.774652] should_fail.cold+0x10a/0x149 [ 1124.778800] ? get_page_from_freelist+0xaf6/0x25a0 [ 1124.783725] __alloc_pages_nodemask+0x21e/0x2900 [ 1124.788480] ? lock_downgrade+0x740/0x740 [ 1124.792637] ? __lock_acquire+0x5fc/0x3f20 [ 1124.796871] ? preempt_count_add+0xaf/0x170 [ 1124.801190] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1124.806041] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1124.811503] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.816521] ? __alloc_pages_nodemask+0x1a8b/0x2900 [ 1124.821536] cache_grow_begin+0x91/0x700 [ 1124.825596] ? fs_reclaim_release+0xd0/0x110 [ 1124.830004] ? check_preemption_disabled+0x35/0x240 [ 1124.835022] cache_alloc_refill+0x273/0x350 [ 1124.839347] kmem_cache_alloc+0x333/0x3c0 [ 1124.843499] getname_kernel+0x4e/0x340 [ 1124.847400] kern_path+0x1b/0x40 [ 1124.850764] lookup_bdev+0xc6/0x1c0 [ 1124.853028] FAULT_INJECTION: forcing a failure. [ 1124.853028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.854381] ? bd_acquire+0x440/0x440 [ 1124.854393] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1124.854406] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1124.854416] blkdev_get_by_path+0x1b/0xa0 [ 1124.854430] mount_bdev+0x4c/0x360 [ 1124.888068] ? fuse_get_root_inode+0xc0/0xc0 [ 1124.892470] mount_fs+0x92/0x2a0 [ 1124.895819] vfs_kern_mount.part.0+0x5b/0x470 [ 1124.900306] do_mount+0xe65/0x2a30 [ 1124.903833] ? retint_kernel+0x2d/0x2d [ 1124.907702] ? copy_mount_string+0x40/0x40 [ 1124.911918] ? copy_mount_options+0x185/0x2f0 [ 1124.916407] ? copy_mount_options+0x18b/0x2f0 [ 1124.920891] ? copy_mount_options+0x1fa/0x2f0 [ 1124.925370] ? copy_mnt_ns+0xa30/0xa30 [ 1124.929245] SyS_mount+0xa8/0x120 [ 1124.932683] ? copy_mnt_ns+0xa30/0xa30 [ 1124.936553] do_syscall_64+0x1d5/0x640 [ 1124.940424] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1124.945598] RIP: 0033:0x7f7c2b8220c9 [ 1124.949288] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1124.956976] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1124.964230] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1124.971492] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1124.978749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1124.986003] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1124.997042] CPU: 0 PID: 4838 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1125.004843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1125.014189] Call Trace: [ 1125.016772] dump_stack+0x1b2/0x281 [ 1125.020405] should_fail.cold+0x10a/0x149 20:25:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0/../file0\x00'}) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) [ 1125.024560] __alloc_pages_nodemask+0x21e/0x2900 [ 1125.029311] ? pcpu_alloc+0x8e8/0xf50 [ 1125.033110] ? pcpu_alloc+0xbe0/0xf50 [ 1125.036909] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1125.041746] ? _find_next_bit+0xdb/0x100 [ 1125.045814] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1125.051264] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.056281] alloc_pages_current+0x155/0x260 [ 1125.060682] ? __lockdep_init_map+0x100/0x560 [ 1125.065171] get_zeroed_page+0x19/0x50 [ 1125.069077] mount_fs+0x1c7/0x2a0 [ 1125.072535] vfs_kern_mount.part.0+0x5b/0x470 [ 1125.077030] do_mount+0xe65/0x2a30 [ 1125.080571] ? copy_mount_string+0x40/0x40 [ 1125.084803] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.089812] ? copy_mnt_ns+0xa30/0xa30 [ 1125.093692] ? copy_mount_options+0x1fa/0x2f0 [ 1125.098184] ? copy_mnt_ns+0xa30/0xa30 [ 1125.102073] SyS_mount+0xa8/0x120 [ 1125.105519] ? copy_mnt_ns+0xa30/0xa30 [ 1125.109399] do_syscall_64+0x1d5/0x640 [ 1125.113288] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1125.118469] RIP: 0033:0x7fafe255f0c9 20:25:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'team0\x00', &(0x7f0000000140)=@ethtool_channels={0x3d, 0x1, 0x2, 0x7f, 0x81, 0x6, 0xbdc, 0x81, 0x1}}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc484, 0x0) 20:25:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 11) 20:25:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff, 0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff, 0x2}}, './file1\x00'}) (async) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) (async) [ 1125.122171] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1125.129871] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1125.137252] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1125.144517] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1125.151805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1125.159066] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1125.236097] FAULT_INJECTION: forcing a failure. [ 1125.236097] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.273538] CPU: 0 PID: 4860 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 20:25:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0/../file0\x00'}) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0/../file0\x00'}) (async) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) (async) [ 1125.281352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1125.290697] Call Trace: [ 1125.293282] dump_stack+0x1b2/0x281 [ 1125.296910] should_fail.cold+0x10a/0x149 [ 1125.301059] should_failslab+0xd6/0x130 [ 1125.305035] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1125.309703] ? set_bdev_super+0x110/0x110 [ 1125.313847] sget_userns+0x102/0xc10 [ 1125.317558] ? set_bdev_super+0x110/0x110 [ 1125.321708] ? ns_test_super+0x50/0x50 [ 1125.325594] ? set_bdev_super+0x110/0x110 [ 1125.329739] ? ns_test_super+0x50/0x50 [ 1125.333624] sget+0xd1/0x110 20:25:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3f}}, './file0/../file0\x00'}) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x0) [ 1125.336643] mount_bdev+0xcd/0x360 [ 1125.340176] ? fuse_get_root_inode+0xc0/0xc0 [ 1125.344584] mount_fs+0x92/0x2a0 [ 1125.347957] vfs_kern_mount.part.0+0x5b/0x470 [ 1125.352448] do_mount+0xe65/0x2a30 [ 1125.355986] ? do_raw_spin_unlock+0x164/0x220 [ 1125.360481] ? copy_mount_string+0x40/0x40 [ 1125.364716] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.369726] ? copy_mnt_ns+0xa30/0xa30 [ 1125.374564] ? copy_mount_options+0x1fa/0x2f0 [ 1125.379056] ? copy_mnt_ns+0xa30/0xa30 [ 1125.382942] SyS_mount+0xa8/0x120 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1125.386393] ? copy_mnt_ns+0xa30/0xa30 [ 1125.390277] do_syscall_64+0x1d5/0x640 [ 1125.394163] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1125.399344] RIP: 0033:0x7f7c2b8220c9 [ 1125.403155] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1125.410864] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1125.418126] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1125.425388] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 20:25:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={'0000000000000000000000000000000', 0x32}, 0x20, 0x0) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'team0\x00', &(0x7f0000000140)=@ethtool_channels={0x3d, 0x1, 0x2, 0x7f, 0x81, 0x6, 0xbdc, 0x81, 0x1}}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0), 0xc484, 0x0) 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1125.432648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1125.439909] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 8) 20:25:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0x800006, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@cachetag}], [{@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@uid_gt={'uid>', 0xee01}}]}}) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (async) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff, 0x2}}, './file1\x00'}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0]}) 20:25:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 12) 20:25:35 executing program 0: setsockopt(0xffffffffffffffff, 0xa1ab, 0x7, &(0x7f0000000000), 0x0) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, 0xffffffffffffffff, 0x10000) mkdirat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0x800006, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@cachetag}], [{@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@uid_gt={'uid>', 0xee01}}]}}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:35 executing program 0: setsockopt(0xffffffffffffffff, 0xa1ab, 0x7, &(0x7f0000000000), 0x0) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, 0xffffffffffffffff, 0x10000) mkdirat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) setsockopt(0xffffffffffffffff, 0xa1ab, 0x7, &(0x7f0000000000), 0x0) (async) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, 0xffffffffffffffff, 0x10000) (async) mkdirat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) 20:25:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1125.619657] FAULT_INJECTION: forcing a failure. [ 1125.619657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:25:35 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/170, 0xaa}) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) [ 1125.663194] FAULT_INJECTION: forcing a failure. [ 1125.663194] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.679900] CPU: 1 PID: 4906 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1125.687712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1125.697060] Call Trace: [ 1125.699652] dump_stack+0x1b2/0x281 [ 1125.703282] should_fail.cold+0x10a/0x149 [ 1125.707468] __alloc_pages_nodemask+0x21e/0x2900 [ 1125.712220] ? pcpu_alloc+0x8e8/0xf50 [ 1125.716024] ? pcpu_alloc+0xbe0/0xf50 [ 1125.719834] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1125.724689] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1125.730177] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.735195] alloc_pages_current+0x155/0x260 [ 1125.739606] ? __lockdep_init_map+0x100/0x560 [ 1125.744104] get_zeroed_page+0x19/0x50 [ 1125.747982] mount_fs+0x1c7/0x2a0 [ 1125.751427] vfs_kern_mount.part.0+0x5b/0x470 [ 1125.755911] do_mount+0xe65/0x2a30 [ 1125.759437] ? copy_mount_string+0x40/0x40 [ 1125.763649] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.768645] ? copy_mnt_ns+0xa30/0xa30 [ 1125.772517] ? copy_mount_options+0x1fa/0x2f0 [ 1125.776988] ? copy_mnt_ns+0xa30/0xa30 [ 1125.780861] SyS_mount+0xa8/0x120 [ 1125.784307] ? copy_mnt_ns+0xa30/0xa30 [ 1125.788182] do_syscall_64+0x1d5/0x640 [ 1125.792078] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1125.797245] RIP: 0033:0x7fafe255f0c9 [ 1125.800931] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:25:36 executing program 4: socket$phonet(0x23, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x11008, 0x0) 20:25:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0x800006, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@cachetag}], [{@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@uid_gt={'uid>', 0xee01}}]}}) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2}) (async) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040), 0x800006, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L}, {@cachetag}], [{@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@uid_gt={'uid>', 0xee01}}]}}) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) 20:25:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 9) 20:25:36 executing program 0: setsockopt(0xffffffffffffffff, 0xa1ab, 0x7, &(0x7f0000000000), 0x0) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, 0xffffffffffffffff, 0x10000) mkdirat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) setsockopt(0xffffffffffffffff, 0xa1ab, 0x7, &(0x7f0000000000), 0x0) (async) mmap$snddsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x4010, 0xffffffffffffffff, 0x10000) (async) mkdirat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x2) (async) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1125.808623] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1125.815870] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1125.823118] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1125.830363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1125.837617] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1125.879192] FAULT_INJECTION: forcing a failure. [ 1125.879192] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.880418] CPU: 0 PID: 4919 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1125.898184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1125.907537] Call Trace: [ 1125.910134] dump_stack+0x1b2/0x281 [ 1125.913762] should_fail.cold+0x10a/0x149 [ 1125.917996] should_failslab+0xd6/0x130 [ 1125.921986] __kmalloc+0x2c1/0x400 [ 1125.925526] ? __list_lru_init+0x67/0x710 [ 1125.929672] __list_lru_init+0x67/0x710 [ 1125.933644] sget_userns+0x4e4/0xc10 [ 1125.937347] ? set_bdev_super+0x110/0x110 [ 1125.941575] ? ns_test_super+0x50/0x50 [ 1125.945447] ? set_bdev_super+0x110/0x110 [ 1125.949576] ? ns_test_super+0x50/0x50 [ 1125.953449] sget+0xd1/0x110 [ 1125.956476] mount_bdev+0xcd/0x360 [ 1125.960005] ? fuse_get_root_inode+0xc0/0xc0 [ 1125.964411] mount_fs+0x92/0x2a0 [ 1125.967789] vfs_kern_mount.part.0+0x5b/0x470 [ 1125.972270] do_mount+0xe65/0x2a30 [ 1125.975798] ? copy_mount_string+0x40/0x40 20:25:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x26, 0xffffffffffffffff, {0x6, 0x7}}, './file0\x00'}) [ 1125.980021] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1125.985028] ? copy_mnt_ns+0xa30/0xa30 [ 1125.988915] ? copy_mount_options+0x1fa/0x2f0 [ 1125.993406] ? copy_mnt_ns+0xa30/0xa30 [ 1125.997289] SyS_mount+0xa8/0x120 [ 1126.000735] ? copy_mnt_ns+0xa30/0xa30 [ 1126.004615] do_syscall_64+0x1d5/0x640 [ 1126.008502] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1126.013676] RIP: 0033:0x7f7c2b8220c9 [ 1126.017377] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 20:25:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2) (async) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x26, 0xffffffffffffffff, {0x6, 0x7}}, './file0\x00'}) [ 1126.025078] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1126.032346] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1126.039615] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1126.046885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1126.054153] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1126.062356] CPU: 1 PID: 4939 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1126.070166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1126.079509] Call Trace: [ 1126.082093] dump_stack+0x1b2/0x281 [ 1126.085749] should_fail.cold+0x10a/0x149 [ 1126.089898] should_failslab+0xd6/0x130 [ 1126.093872] kmem_cache_alloc+0x28e/0x3c0 [ 1126.098020] getname_kernel+0x4e/0x340 [ 1126.101904] kern_path+0x1b/0x40 [ 1126.105263] lookup_bdev+0xc6/0x1c0 [ 1126.108882] ? bd_acquire+0x440/0x440 [ 1126.112676] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1126.118126] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.123139] blkdev_get_by_path+0x1b/0xa0 [ 1126.127281] mount_bdev+0x4c/0x360 [ 1126.130819] ? fuse_get_root_inode+0xc0/0xc0 [ 1126.135233] mount_fs+0x92/0x2a0 [ 1126.138599] vfs_kern_mount.part.0+0x5b/0x470 [ 1126.143093] do_mount+0xe65/0x2a30 [ 1126.146640] ? copy_mount_string+0x40/0x40 [ 1126.150870] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.155884] ? copy_mnt_ns+0xa30/0xa30 [ 1126.159760] ? copy_mount_options+0x1fa/0x2f0 [ 1126.164232] ? copy_mnt_ns+0xa30/0xa30 [ 1126.168098] SyS_mount+0xa8/0x120 [ 1126.171524] ? copy_mnt_ns+0xa30/0xa30 [ 1126.175389] do_syscall_64+0x1d5/0x640 [ 1126.179272] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1126.184445] RIP: 0033:0x7fafe255f0c9 [ 1126.188156] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1126.195948] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1126.203214] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1126.210557] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1126.217823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 20:25:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 13) 20:25:36 executing program 2: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:36 executing program 4: socket$phonet(0x23, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x11008, 0x0) 20:25:36 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/170, 0xaa}) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (rerun: 64) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 10) [ 1126.225077] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 20:25:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x2) (async, rerun: 32) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000800)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x26, 0xffffffffffffffff, {0x6, 0x7}}, './file0\x00'}) [ 1126.291047] FAULT_INJECTION: forcing a failure. [ 1126.291047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1126.302894] CPU: 1 PID: 4967 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1126.310687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1126.320038] Call Trace: [ 1126.322624] dump_stack+0x1b2/0x281 [ 1126.326257] should_fail.cold+0x10a/0x149 [ 1126.330406] ? get_page_from_freelist+0xaf6/0x25a0 [ 1126.333317] FAULT_INJECTION: forcing a failure. [ 1126.333317] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.335335] __alloc_pages_nodemask+0x21e/0x2900 [ 1126.335364] ? lock_downgrade+0x740/0x740 [ 1126.335382] ? __lock_acquire+0x5fc/0x3f20 [ 1126.359651] ? preempt_count_add+0xaf/0x170 [ 1126.363979] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 1126.368833] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1126.374288] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.380524] ? __alloc_pages_nodemask+0x1a8b/0x2900 [ 1126.385544] cache_grow_begin+0x91/0x700 [ 1126.389596] ? fs_reclaim_release+0xd0/0x110 [ 1126.393993] ? check_preemption_disabled+0x35/0x240 [ 1126.399004] cache_alloc_refill+0x273/0x350 [ 1126.403322] kmem_cache_alloc+0x333/0x3c0 [ 1126.407465] getname_kernel+0x4e/0x340 [ 1126.411347] kern_path+0x1b/0x40 [ 1126.414697] lookup_bdev+0xc6/0x1c0 [ 1126.418309] ? bd_acquire+0x440/0x440 [ 1126.422103] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1126.427551] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.432561] blkdev_get_by_path+0x1b/0xa0 [ 1126.436696] mount_bdev+0x4c/0x360 [ 1126.440217] ? fuse_get_root_inode+0xc0/0xc0 [ 1126.444606] mount_fs+0x92/0x2a0 [ 1126.447977] vfs_kern_mount.part.0+0x5b/0x470 [ 1126.452467] do_mount+0xe65/0x2a30 [ 1126.456003] ? copy_mount_string+0x40/0x40 [ 1126.460227] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.465229] ? copy_mnt_ns+0xa30/0xa30 [ 1126.469100] ? copy_mount_options+0x1fa/0x2f0 [ 1126.473579] ? copy_mnt_ns+0xa30/0xa30 [ 1126.477470] SyS_mount+0xa8/0x120 [ 1126.480909] ? copy_mnt_ns+0xa30/0xa30 [ 1126.484779] do_syscall_64+0x1d5/0x640 20:25:36 executing program 2: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x6) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100) (async) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1126.488671] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1126.493841] RIP: 0033:0x7fafe255f0c9 [ 1126.497534] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1126.505221] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1126.512495] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1126.519742] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1126.526989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1126.534239] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 20:25:36 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x88000, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}], 0xa, "5548099ecbf3ea6a7e3910c2697ae63540cc362fcef92ac5db5e2d0f1411f92de0bbc22e68650992c6e8ecbf7c4734438a35213c008bd2e3858d1ba10035c8"}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xe4, 0x29, 0x1, {0x9, [{{0x8, 0x3, 0x7}, 0x1, 0x4, 0x7, './file0'}, {{0x84, 0x4, 0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x20, 0x4, 0x8}, 0x6, 0xe2, 0x7, './file0'}, {{0x4, 0x3, 0x2}, 0x0, 0x80, 0x7, './file0'}, {{0x10, 0x1}, 0xbaf5, 0x13, 0x7, './file0'}, {{0x80, 0x2, 0x7}, 0xffffffffffffffff, 0x1, 0x7, './file0'}, {{0x40, 0x2, 0x3}, 0x8000, 0x0, 0x7, './file0'}]}}, 0xe4) [ 1126.541512] CPU: 0 PID: 4973 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1126.549307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1126.558686] Call Trace: [ 1126.561270] dump_stack+0x1b2/0x281 [ 1126.564916] should_fail.cold+0x10a/0x149 [ 1126.569066] should_failslab+0xd6/0x130 [ 1126.573041] __kmalloc+0x2c1/0x400 [ 1126.576582] ? __list_lru_init+0x67/0x710 [ 1126.580733] __list_lru_init+0x67/0x710 [ 1126.584705] sget_userns+0x504/0xc10 20:25:36 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x88000, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}], 0xa, "5548099ecbf3ea6a7e3910c2697ae63540cc362fcef92ac5db5e2d0f1411f92de0bbc22e68650992c6e8ecbf7c4734438a35213c008bd2e3858d1ba10035c8"}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) (async, rerun: 32) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async, rerun: 32) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xe4, 0x29, 0x1, {0x9, [{{0x8, 0x3, 0x7}, 0x1, 0x4, 0x7, './file0'}, {{0x84, 0x4, 0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x20, 0x4, 0x8}, 0x6, 0xe2, 0x7, './file0'}, {{0x4, 0x3, 0x2}, 0x0, 0x80, 0x7, './file0'}, {{0x10, 0x1}, 0xbaf5, 0x13, 0x7, './file0'}, {{0x80, 0x2, 0x7}, 0xffffffffffffffff, 0x1, 0x7, './file0'}, {{0x40, 0x2, 0x3}, 0x8000, 0x0, 0x7, './file0'}]}}, 0xe4) [ 1126.588417] ? set_bdev_super+0x110/0x110 [ 1126.592568] ? ns_test_super+0x50/0x50 [ 1126.596452] ? set_bdev_super+0x110/0x110 [ 1126.600595] ? ns_test_super+0x50/0x50 [ 1126.604477] sget+0xd1/0x110 [ 1126.607495] mount_bdev+0xcd/0x360 [ 1126.611030] ? fuse_get_root_inode+0xc0/0xc0 [ 1126.615437] mount_fs+0x92/0x2a0 [ 1126.618809] vfs_kern_mount.part.0+0x5b/0x470 [ 1126.623304] do_mount+0xe65/0x2a30 [ 1126.626842] ? do_raw_spin_unlock+0x164/0x220 [ 1126.631339] ? copy_mount_string+0x40/0x40 [ 1126.635581] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1126.640599] ? copy_mnt_ns+0xa30/0xa30 [ 1126.644491] ? copy_mount_options+0x1fa/0x2f0 [ 1126.648982] ? copy_mnt_ns+0xa30/0xa30 [ 1126.652872] SyS_mount+0xa8/0x120 [ 1126.656319] ? copy_mnt_ns+0xa30/0xa30 [ 1126.660203] do_syscall_64+0x1d5/0x640 [ 1126.664091] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1126.669270] RIP: 0033:0x7f7c2b8220c9 [ 1126.672972] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1126.680696] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 20:25:36 executing program 2: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x6) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x100) (async) lchown(&(0x7f0000000140)='./file0\x00', r0, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) 20:25:37 executing program 5: ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/170, 0xaa}) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) 20:25:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)) (fail_nth: 11) 20:25:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000280)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 14) [ 1126.687960] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1126.695229] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1126.702496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1126.709764] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 20:25:37 executing program 4: socket$phonet(0x23, 0x2, 0x1) (async, rerun: 64) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async, rerun: 64) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x11008, 0x0) 20:25:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x88000, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}], 0xa, "5548099ecbf3ea6a7e3910c2697ae63540cc362fcef92ac5db5e2d0f1411f92de0bbc22e68650992c6e8ecbf7c4734438a35213c008bd2e3858d1ba10035c8"}, 0x6e) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xe4, 0x29, 0x1, {0x9, [{{0x8, 0x3, 0x7}, 0x1, 0x4, 0x7, './file0'}, {{0x84, 0x4, 0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x20, 0x4, 0x8}, 0x6, 0xe2, 0x7, './file0'}, {{0x4, 0x3, 0x2}, 0x0, 0x80, 0x7, './file0'}, {{0x10, 0x1}, 0xbaf5, 0x13, 0x7, './file0'}, {{0x80, 0x2, 0x7}, 0xffffffffffffffff, 0x1, 0x7, './file0'}, {{0x40, 0x2, 0x3}, 0x8000, 0x0, 0x7, './file0'}]}}, 0xe4) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x88000, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}, {0x20, 'fuseblk\x00'}], 0xa, "5548099ecbf3ea6a7e3910c2697ae63540cc362fcef92ac5db5e2d0f1411f92de0bbc22e68650992c6e8ecbf7c4734438a35213c008bd2e3858d1ba10035c8"}, 0x6e) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xe4, 0x29, 0x1, {0x9, [{{0x8, 0x3, 0x7}, 0x1, 0x4, 0x7, './file0'}, {{0x84, 0x4, 0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x20, 0x4, 0x8}, 0x6, 0xe2, 0x7, './file0'}, {{0x4, 0x3, 0x2}, 0x0, 0x80, 0x7, './file0'}, {{0x10, 0x1}, 0xbaf5, 0x13, 0x7, './file0'}, {{0x80, 0x2, 0x7}, 0xffffffffffffffff, 0x1, 0x7, './file0'}, {{0x40, 0x2, 0x3}, 0x8000, 0x0, 0x7, './file0'}]}}, 0xe4) (async) 20:25:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x8d, 0x29, 0x1, {0x3, [{{0x10, 0x1, 0x3}, 0x1, 0x40, 0xd, './file0/file0'}, {{0x1, 0x0, 0x2}, 0x6, 0x4, 0x7, './file1'}, {{0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x2, 0x3, 0x5}, 0x7, 0x9, 0x7, './file0'}]}}, 0x8d) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={'U-', 0x4}, 0x16, 0x3) 20:25:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000012c0)={&(0x7f0000001280)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000001300)='./file1\x00', 0x0, 0x7ff, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0/file0\x00', 0x6) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r0, 0xc01064c1, &(0x7f0000000080)={0x0, 0x1, 0xffffffffffffffff}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r2, 0xc01064c1, &(0x7f00000003c0)) [ 1126.816687] FAULT_INJECTION: forcing a failure. [ 1126.816687] name failslab, interval 1, probability 0, space 0, times 0 20:25:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x8d, 0x29, 0x1, {0x3, [{{0x10, 0x1, 0x3}, 0x1, 0x40, 0xd, './file0/file0'}, {{0x1, 0x0, 0x2}, 0x6, 0x4, 0x7, './file1'}, {{0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x2, 0x3, 0x5}, 0x7, 0x9, 0x7, './file0'}]}}, 0x8d) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) 20:25:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={'U-', 0x4}, 0x16, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={'U-', 0x4}, 0x16, 0x3) (async) 20:25:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x8d, 0x29, 0x1, {0x3, [{{0x10, 0x1, 0x3}, 0x1, 0x40, 0xd, './file0/file0'}, {{0x1, 0x0, 0x2}, 0x6, 0x4, 0x7, './file1'}, {{0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x2, 0x3, 0x5}, 0x7, 0x9, 0x7, './file0'}]}}, 0x8d) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) (async) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x8d, 0x29, 0x1, {0x3, [{{0x10, 0x1, 0x3}, 0x1, 0x40, 0xd, './file0/file0'}, {{0x1, 0x0, 0x2}, 0x6, 0x4, 0x7, './file1'}, {{0x8}, 0x9, 0x0, 0x7, './file0'}, {{0x2, 0x3, 0x5}, 0x7, 0x9, 0x7, './file0'}]}}, 0x8d) (async) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) (async) [ 1126.906309] CPU: 1 PID: 5008 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 1126.914128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1126.923475] Call Trace: [ 1126.926061] dump_stack+0x1b2/0x281 [ 1126.929692] should_fail.cold+0x10a/0x149 [ 1126.933854] should_failslab+0xd6/0x130 [ 1126.937839] __kmalloc+0x2c1/0x400 [ 1126.941374] ? __list_lru_init+0x67/0x710 [ 1126.945519] __list_lru_init+0x67/0x710 [ 1126.949492] sget_userns+0x504/0xc10 20:25:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x28) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) [ 1126.953204] ? set_bdev_super+0x110/0x110 [ 1126.957354] ? ns_test_super+0x50/0x50 [ 1126.961241] ? set_bdev_super+0x110/0x110 [ 1126.965384] ? ns_test_super+0x50/0x50 [ 1126.969263] sget+0xd1/0x110 [ 1126.972283] mount_bdev+0xcd/0x360 [ 1126.975814] ? fuse_get_root_inode+0xc0/0xc0 [ 1126.980214] mount_fs+0x92/0x2a0 [ 1126.983578] vfs_kern_mount.part.0+0x5b/0x470 [ 1126.988073] do_mount+0xe65/0x2a30 [ 1126.991618] ? copy_mount_string+0x40/0x40 [ 1126.995850] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1127.000868] ? copy_mnt_ns+0xa30/0xa30 [ 1127.004752] ? copy_mount_options+0x1fa/0x2f0 [ 1127.009242] ? copy_mnt_ns+0xa30/0xa30 [ 1127.013128] SyS_mount+0xa8/0x120 [ 1127.016573] ? copy_mnt_ns+0xa30/0xa30 [ 1127.020457] do_syscall_64+0x1d5/0x640 [ 1127.024357] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1127.029533] RIP: 0033:0x7fafe255f0c9 [ 1127.033229] RSP: 002b:00007fafe0ad1168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1127.040925] RAX: ffffffffffffffda RBX: 00007fafe267ef80 RCX: 00007fafe255f0c9 [ 1127.048173] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1127.055424] RBP: 00007fafe0ad11d0 R08: 0000000020000280 R09: 0000000000000000 [ 1127.062679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1127.069937] R13: 00007ffd60402d8f R14: 00007fafe0ad1300 R15: 0000000000022000 [ 1127.090365] FAULT_INJECTION: forcing a failure. [ 1127.090365] name failslab, interval 1, probability 0, space 0, times 0 20:25:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group\b\x00d=', @ANYRESDEC=0x0, @ANYBLOB="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"]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000001040)=""/4093) faccessat(r0, 0x0, 0x10) r1 = syz_open_dev$dri(&(0x7f0000000280), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r1, 0xc02064c3, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 20:25:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={'U-', 0x4}, 0x16, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f00000007c0)='./file0\x00', 0x0) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000000)) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140)={'U-', 0x4}, 0x16, 0x3) (async) [ 1127.106172] CPU: 1 PID: 5019 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1127.113968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1127.123312] Call Trace: [ 1127.125900] dump_stack+0x1b2/0x281 [ 1127.129532] should_fail.cold+0x10a/0x149 [ 1127.133684] should_failslab+0xd6/0x130 [ 1127.137662] __kmalloc+0x2c1/0x400 [ 1127.141200] ? register_shrinker+0x1ab/0x220 [ 1127.145604] register_shrinker+0x1ab/0x220 [ 1127.149836] sget_userns+0x9aa/0xc10 [ 1127.153549] ? set_bdev_super+0x110/0x110 [ 1127.157846] ? ns_test_super+0x50/0x50 [ 1127.161733] ? set_bdev_super+0x110/0x110 [ 1127.165883] ? ns_test_super+0x50/0x50 [ 1127.169764] sget+0xd1/0x110 [ 1127.172782] mount_bdev+0xcd/0x360 [ 1127.176317] ? fuse_get_root_inode+0xc0/0xc0 [ 1127.180741] mount_fs+0x92/0x2a0 [ 1127.184114] vfs_kern_mount.part.0+0x5b/0x470 [ 1127.188614] do_mount+0xe65/0x2a30 [ 1127.192157] ? copy_mount_string+0x40/0x40 [ 1127.196401] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1127.201421] ? copy_mnt_ns+0xa30/0xa30 [ 1127.205307] ? copy_mount_options+0x1fa/0x2f0 [ 1127.209803] ? copy_mnt_ns+0xa30/0xa30 [ 1127.213687] SyS_mount+0xa8/0x120 [ 1127.217133] ? copy_mnt_ns+0xa30/0xa30 [ 1127.221010] do_syscall_64+0x1d5/0x640 [ 1127.224891] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1127.230059] RIP: 0033:0x7f7c2b8220c9 [ 1127.233747] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1127.241438] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1127.248690] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1127.256030] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1127.263279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1127.270530] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1127.286601] ------------[ cut here ]------------ [ 1127.291379] WARNING: CPU: 0 PID: 5019 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 1127.299154] Kernel panic - not syncing: panic_on_warn set ... [ 1127.299154] [ 1127.306491] CPU: 0 PID: 5019 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 1127.314256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 1127.323582] Call Trace: [ 1127.326151] dump_stack+0x1b2/0x281 [ 1127.329754] panic+0x1f9/0x42d [ 1127.332939] ? add_taint.cold+0x16/0x16 [ 1127.336891] ? kill_block_super+0xbe/0xe0 [ 1127.341011] ? __warn.cold+0x5/0x44 [ 1127.344612] ? kill_block_super+0xbe/0xe0 [ 1127.348740] __warn.cold+0x20/0x44 [ 1127.352258] ? ist_end_non_atomic+0x10/0x10 [ 1127.356554] ? kill_block_super+0xbe/0xe0 [ 1127.360676] report_bug+0x208/0x250 [ 1127.364295] do_error_trap+0x195/0x2d0 [ 1127.368158] ? math_error+0x2d0/0x2d0 [ 1127.371952] ? retint_kernel+0x2d/0x2d [ 1127.375819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1127.380742] invalid_op+0x1b/0x40 [ 1127.384169] RIP: 0010:kill_block_super+0xbe/0xe0 [ 1127.388993] RSP: 0018:ffff88807c1efbc8 EFLAGS: 00010246 [ 1127.394344] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900069ef000 [ 1127.401603] RDX: 0000000000040000 RSI: ffffffff8187781e RDI: ffff888090345c30 [ 1127.408848] RBP: ffff8880b5354280 R08: ffffffff8b9d3458 R09: 0000000000000001 [ 1127.416094] R10: 0000000000000000 R11: ffff88809392e200 R12: ffff888090345780 [ 1127.423424] R13: ffffffff891eabb0 R14: ffffffff88f45bc0 R15: dffffc0000000000 [ 1127.430679] ? kill_block_super+0xbe/0xe0 [ 1127.434805] ? kill_block_super+0xbe/0xe0 [ 1127.438929] deactivate_locked_super+0x6c/0xd0 [ 1127.443484] sget_userns+0x9c4/0xc10 [ 1127.447177] ? set_bdev_super+0x110/0x110 [ 1127.451300] ? ns_test_super+0x50/0x50 [ 1127.455164] ? set_bdev_super+0x110/0x110 [ 1127.459283] ? ns_test_super+0x50/0x50 [ 1127.463145] sget+0xd1/0x110 [ 1127.466137] mount_bdev+0xcd/0x360 [ 1127.469652] ? fuse_get_root_inode+0xc0/0xc0 [ 1127.474033] mount_fs+0x92/0x2a0 [ 1127.477382] vfs_kern_mount.part.0+0x5b/0x470 [ 1127.481855] do_mount+0xe65/0x2a30 [ 1127.485374] ? copy_mount_string+0x40/0x40 [ 1127.489583] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 1127.494571] ? copy_mnt_ns+0xa30/0xa30 [ 1127.498432] ? copy_mount_options+0x1fa/0x2f0 [ 1127.502901] ? copy_mnt_ns+0xa30/0xa30 [ 1127.506782] SyS_mount+0xa8/0x120 [ 1127.510213] ? copy_mnt_ns+0xa30/0xa30 [ 1127.514100] do_syscall_64+0x1d5/0x640 [ 1127.517966] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 1127.523130] RIP: 0033:0x7f7c2b8220c9 [ 1127.526813] RSP: 002b:00007f7c29d94168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1127.534496] RAX: ffffffffffffffda RBX: 00007f7c2b941f80 RCX: 00007f7c2b8220c9 [ 1127.541752] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000020000040 [ 1127.548997] RBP: 00007f7c29d941d0 R08: 0000000020000280 R09: 0000000000000000 [ 1127.556241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1127.563482] R13: 00007ffd640bdf5f R14: 00007f7c29d94300 R15: 0000000000022000 [ 1127.571075] Kernel Offset: disabled [ 1127.574729] Rebooting in 86400 seconds..