00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 4: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 2: r0 = socket(0x1d, 0x3, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:30 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 3: socket$packet(0x11, 0x2, 0x300) connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x2, 0x0, 0x1, 0x81, 0x6, @multicast}, 0x14) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 4: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 2: r0 = socket(0x1d, 0x3, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:30 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, 0x0, 0x0) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 4: socket$packet(0x11, 0x2, 0x300) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 2: r0 = socket(0x1d, 0x3, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:30 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, 0x0, 0x0) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 2: socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, 0x0, 0x0) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 2: socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:30 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:30 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:30 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x81, 0x6, @multicast}, 0x14) 17:10:30 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 5: socket$packet(0x11, 0x2, 0x300) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 2: socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x453, 0x1, 0x70bd2a, 0x25dfdbff, "9e7a7b4a3af0f8670786ce05d38b47dce6142d686eab70ddc082cb6169c8c98dd841", ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x24000804) 17:10:31 executing program 3: socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x2000, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x3, 0x4) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 4: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x41}}}}, 0xa0) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x24000804) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x41}}}}, 0xa0) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 17:10:31 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, 0x0, 0x24000804) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x41}}}}, 0xa0) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 5: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)={0x0, "b036175557c2817d4d1791d348fb15b5b0375c8f40fbb2eccfd9f1ea2fba0525cd1d0ccd6a2b30efc75a4f63b896d10e89365099bb138ea83e3a4790b26d4a22", 0x23}, 0x48, 0xfffffffffffffff9) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:31 executing program 4: socket$alg(0x26, 0x5, 0x0) msgget$private(0x0, 0x0) r0 = gettid() syz_open_procfs(r0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='numa_maps\x00') semget$private(0x0, 0x1, 0x662) 17:10:31 executing program 0: socket$packet(0x11, 0x0, 0x300) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 5: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000340)={0xfffffffffffffffe, 0x0, 0x800}) 17:10:31 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:31 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x24000804) 17:10:31 executing program 5: sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x8, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x60000040) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280), 0x106, 0x9}}, 0x20) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d2de64c902a1c6b39c6eb631f6cc3ae007e6c8f53dc66de321ee8fdfdbdb4ae71a724a54440cd4cdc3ee28b159330765c8c39b8f5952", @ANYRES16=r0, @ANYRES32, @ANYRES32=r0, @ANYRES64], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000780)={0x424, 0x3f3, 0x300, 0x70bd28, 0x25dfdbfe, {0x5, 0x2, 0x3, [0x8, 0x5, 0xffff, 0x80000000, 0x101, 0x7, 0x7, 0x89, 0x124e6d3a, 0xb7, 0x997, 0xfffffffe, 0x78, 0x6, 0x7fffffff, 0xfffffffa, 0x23, 0x7fffffff, 0x2, 0x200, 0x8, 0x80, 0x2, 0x0, 0x64, 0x0, 0x6, 0x3ff, 0x2, 0x0, 0x9, 0x7fff, 0x4, 0x1, 0x6, 0xffffff81, 0xfffffffe, 0x7, 0x40, 0x40, 0x1ff, 0x2, 0x14000, 0x2b, 0xffffffff, 0x1a, 0x0, 0xad, 0xc7, 0x7, 0x61bd, 0x4, 0x100, 0x2, 0x3, 0x1ff, 0x4, 0x100, 0x0, 0x200, 0x4623d865, 0xffffffff, 0x100, 0x4], [0x3, 0x4, 0x1ff, 0x8, 0x3, 0x80, 0x0, 0x0, 0x4e00000, 0x6, 0x7, 0xffffff08, 0x8, 0x1, 0x100, 0x1, 0x0, 0x7f, 0x6, 0x0, 0x5, 0x20000000, 0x3, 0x7f, 0x7, 0x9, 0x80000000, 0x522b, 0x3ff, 0x9, 0x2, 0x0, 0x8bb, 0x9, 0x3, 0x79cb, 0x3, 0x3ff, 0x23, 0xe3, 0x7fffffff, 0x2, 0x3, 0x80, 0x9c, 0x4, 0x7ff, 0x3f, 0x80000000, 0x3, 0x0, 0xd5, 0x4, 0x7660bcde, 0xb5, 0xfffffffd, 0x2, 0x8, 0x3, 0x5, 0x2, 0x4, 0x10000, 0x80], [0x7, 0x5, 0xffffffc0, 0x6, 0x5, 0xbb5, 0x7ff, 0x7, 0x4108167c, 0x1, 0x1ff, 0x4, 0x2, 0x800, 0x9, 0x100, 0x4d0, 0x2, 0x374d, 0x80000000, 0x80, 0x2, 0x7, 0x8, 0x3, 0x8, 0x400, 0x1, 0x8, 0x7, 0x2, 0xc88, 0x3, 0x55fd, 0x2, 0x2, 0x2, 0x100, 0x3ff, 0x2054, 0x2, 0x5, 0x1, 0x401, 0xffff, 0x5, 0xe9e, 0x200, 0x7, 0x7, 0x3, 0xba, 0x895, 0x81, 0x1ff, 0x59bd0c3b, 0x0, 0x8, 0x1, 0x9, 0xdf, 0x7, 0x2, 0xd3a], [0x9000000, 0x40000, 0x20, 0x7, 0xffffffff, 0x101, 0x8, 0x4, 0xcfb6, 0xff, 0x5, 0x96aa, 0x0, 0x9597, 0x80, 0x2, 0x400, 0x8, 0x7fff, 0x1000, 0x2, 0x1000, 0xfffffffb, 0xe3, 0x49, 0x8, 0x0, 0x7ff, 0x1, 0x5, 0x7, 0x3, 0x2, 0xe48d, 0x7, 0x6, 0x1, 0xcfa, 0x14890983, 0x9, 0x800, 0x80000001, 0x0, 0x1, 0x800, 0x20, 0x7fff, 0x8, 0x4, 0x6, 0x100, 0xfffffffd, 0x1, 0xfff, 0x3ff, 0x8001, 0x200, 0x5, 0x6, 0x2, 0x3ff, 0x6, 0xf51, 0x7], 0x4, ['\x00', '%/\x00']}, ["", "", "", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x4000001}, 0x14) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sctp\x00') write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000240)={0xa, 0x4}, 0xc) r3 = gettid() syz_open_procfs(r3, 0x0) getpgrp(r3) 17:10:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 17:10:31 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000001600)=""/4096, &(0x7f0000002600)=0x1000) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x24000804) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x5, [@struct={0x3, 0x5, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x4, 0x8}, {0x0, 0x0, 0xa360}, {0x1, 0x2, 0x101}, {0xb, 0x4, 0xffffffed}, {0x6, 0x1, 0x8}]}, @struct={0x7, 0x8, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x5, 0x800}, {0x3, 0x2, 0x9}, {0x0, 0x0, 0x3}, {0x10, 0x3, 0x1}, {0x10, 0x4, 0x9}, {0x2, 0x3, 0xd234}, {0x7, 0x1, 0x72}, {0x2, 0x3}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/132, 0xdd, 0x84}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x4b) 17:10:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000001600)=""/4096, &(0x7f0000002600)=0x1000) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x5, [@struct={0x3, 0x5, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x4, 0x8}, {0x0, 0x0, 0xa360}, {0x1, 0x2, 0x101}, {0xb, 0x4, 0xffffffed}, {0x6, 0x1, 0x8}]}, @struct={0x7, 0x8, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x5, 0x800}, {0x3, 0x2, 0x9}, {0x0, 0x0, 0x3}, {0x10, 0x3, 0x1}, {0x10, 0x4, 0x9}, {0x2, 0x3, 0xd234}, {0x7, 0x1, 0x72}, {0x2, 0x3}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/132, 0xdd, 0x84}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x4b) 17:10:32 executing program 2: r0 = socket(0x1d, 0x3, 0x1) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 17:10:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000001600)=""/4096, &(0x7f0000002600)=0x1000) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x5, [@struct={0x3, 0x5, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x4, 0x8}, {0x0, 0x0, 0xa360}, {0x1, 0x2, 0x101}, {0xb, 0x4, 0xffffffed}, {0x6, 0x1, 0x8}]}, @struct={0x7, 0x8, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x5, 0x800}, {0x3, 0x2, 0x9}, {0x0, 0x0, 0x3}, {0x10, 0x3, 0x1}, {0x10, 0x4, 0x9}, {0x2, 0x3, 0xd234}, {0x7, 0x1, 0x72}, {0x2, 0x3}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/132, 0xdd, 0x84}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x40, 0x0) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x4b) 17:10:32 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x2, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x5, [@struct={0x3, 0x5, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x4, 0x8}, {0x0, 0x0, 0xa360}, {0x1, 0x2, 0x101}, {0xb, 0x4, 0xffffffed}, {0x6, 0x1, 0x8}]}, @struct={0x7, 0x8, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x5, 0x800}, {0x3, 0x2, 0x9}, {0x0, 0x0, 0x3}, {0x10, 0x3, 0x1}, {0x10, 0x4, 0x9}, {0x2, 0x3, 0xd234}, {0x7, 0x1, 0x72}, {0x2, 0x3}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/132, 0xdd, 0x84}, 0x20) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x4b) 17:10:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x4b) 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x4b) 17:10:32 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 0: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 2: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@typedef={0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000040)=""/33, 0x27, 0x21, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x4b) 17:10:32 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 3: syz_open_procfs(0x0, 0x0) 17:10:32 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:32 executing program 2: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:32 executing program 5: bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x4b) 17:10:32 executing program 3: syz_open_procfs(0x0, 0x0) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 17:10:33 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000080)={0x8, 0x101, 0x1, &(0x7f0000000040)="ee"}) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 5: bpf$BPF_GET_BTF_INFO(0x2, 0x0, 0x0) 17:10:33 executing program 3: syz_open_procfs(0x0, 0x0) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 17:10:33 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 5: bpf$BPF_GET_BTF_INFO(0x2, 0x0, 0x0) 17:10:33 executing program 3: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4) socket$packet(0x11, 0x2, 0x300) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000240)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x401, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x220c0800}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) socket(0xa, 0x3, 0x5) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0x0, 0x3d}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 5: bpf$BPF_GET_BTF_INFO(0x2, 0x0, 0x0) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x6}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x1) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r1 = socket(0x1a, 0x80b, 0x3) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x34}}, 0x8040001) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0100eb", @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250100000008000100", @ANYRES32=r0, @ANYBLOB="000102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400f9ffffff3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x11c}, 0x1, 0x0, 0x0, 0x8008}, 0x40010) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:33 executing program 4: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x7, 0x2, 0xff, 0x401}, {0x20, 0x7, 0x6}, {0x8, 0xff, 0xff, 0x4}, {0x4, 0x81, 0xb1, 0x4}, {0x1, 0x46, 0x1, 0xe3}]}, 0x10) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r1 = socket(0x1a, 0x80b, 0x3) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x34}}, 0x8040001) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0100eb", @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250100000008000100", @ANYRES32=r0, @ANYBLOB="000102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400f9ffffff3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x11c}, 0x1, 0x0, 0x0, 0x8008}, 0x40010) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/hci\x00') getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) 17:10:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r1 = socket(0x1a, 0x80b, 0x3) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x34}}, 0x8040001) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0100eb", @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250100000008000100", @ANYRES32=r0, @ANYBLOB="000102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400f9ffffff3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x11c}, 0x1, 0x0, 0x0, 0x8008}, 0x40010) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:33 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6}, 0x10) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000180)={r7, 0x1, 0x6}, 0x10) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000180)={r11, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="48030000", @ANYRES16=r2, @ANYBLOB="01002bbd7000fcdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="300202803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r4, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000100000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000c6fe03000b000000080004000010000008000600", @ANYRES32=r7, @ANYBLOB="3c000100240005006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000040000100240001006c625f74785f686173685f744f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r9, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b0000000800040008bd206c08000600", @ANYRES32=r11, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400b502000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400fdffffff08000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f616463617374000000"], 0x348}}, 0x8010) semget$private(0x0, 0x4, 0x97) 17:10:33 executing program 4: r0 = syz_open_procfs(0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x481) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) r0 = socket(0x1a, 0x80b, 0x3) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x34, r1, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x34}}, 0x8040001) 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) [ 578.967641] device batadv_slave_1 entered promiscuous mode 17:10:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:33 executing program 4: r0 = syz_open_procfs(0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) [ 579.011654] device batadv_slave_1 left promiscuous mode 17:10:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) socket(0x1a, 0x80b, 0x3) syz_genetlink_get_family_id$batadv(&(0x7f0000000300)='batadv\x00') 17:10:33 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:33 executing program 4: r0 = syz_open_procfs(0x0, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:33 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:33 executing program 2: syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:34 executing program 0: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) socket(0x1a, 0x80b, 0x3) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:34 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:34 executing program 0: syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) socket(0x1a, 0x80b, 0x3) 17:10:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:34 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x0) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 3: socket(0x1a, 0x80b, 0x3) 17:10:34 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(0xffffffffffffffff, &(0x7f0000000200)={""/5100}, 0x1400) 17:10:34 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x0) 17:10:34 executing program 3: socket(0x0, 0x80b, 0x3) 17:10:34 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, 0x0, 0x0) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}}, 0xa0) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x0) 17:10:34 executing program 3: socket(0x0, 0x0, 0x3) 17:10:34 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}}, 0xa0) 17:10:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, 0x0, 0x0) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:34 executing program 3: socket(0x0, 0x0, 0x3) 17:10:34 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x1, 0xffffffffffffffff, 0x10, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}}, 0xa0) 17:10:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='schedstat\x00') read$char_raw(r0, 0x0, 0x0) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:34 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) 17:10:34 executing program 3: socket(0x0, 0x0, 0x3) 17:10:34 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) 17:10:34 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:34 executing program 3: socket(0x0, 0x80b, 0x0) 17:10:35 executing program 5: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x1f, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, 0x0, &(0x7f00000000c0)) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) 17:10:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) 17:10:35 executing program 4: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0x4, 0x4) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000240)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x401, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x220c0800}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="f670ec6766c74424000c0000006766c744240203af00006766c744240600000000670f0114240f21443e0f78804f000f300f01c90f350f01c30f213a0fc76fdd", 0x40}], 0x1, 0x68, &(0x7f0000000080), 0x0) getpeername$packet(r0, 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) accept4$packet(r4, &(0x7f0000000280), &(0x7f00000002c0)=0x14, 0x80000) socket(0xa, 0x3, 0x5) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, 0x0, &(0x7f00000000c0)) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, 0x0, &(0x7f00000000c0)) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 4: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, 0x0, &(0x7f00000000c0)) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:35 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 3: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 0: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') 17:10:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:35 executing program 3: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:35 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:35 executing program 3: socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:35 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) 17:10:35 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:35 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:35 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:35 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, &(0x7f00000000c0)=0x20) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) 17:10:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:36 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 2: syz_open_procfs(0x0, 0x0) 17:10:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x1c) 17:10:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') 17:10:36 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) 17:10:36 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/32, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 17:10:36 executing program 4: syz_open_procfs(0x0, 0x0) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 4: syz_open_procfs(0x0, 0x0) 17:10:36 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x5, 0x7ff, 0xd, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 3: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 4: syz_open_procfs(0x0, 0x0) 17:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TRIM(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x22000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3f6, 0x100, 0x70bd25, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24008054}, 0x4000841) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x10, 0x30, 0xfa00, {&(0x7f00000006c0), 0x0, {0xa, 0x4e24, 0xfffffff7, @private2, 0x3}}}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r1, 0x1269, &(0x7f00000000c0)={0x4, 0x3, 0x34, &(0x7f0000000080)="f562b6dac2cd394ce7e05aed8fe7d6869043537c9a0377a0707c2681e7f881a0b9efee79baf2c6407cd36d6acb3556ae7cc11d95"}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000040)={r0, 0x2c, 0x0}, 0xfd81) 17:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TRIM(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x22000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3f6, 0x100, 0x70bd25, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24008054}, 0x4000841) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x10, 0x30, 0xfa00, {&(0x7f00000006c0), 0x0, {0xa, 0x4e24, 0xfffffff7, @private2, 0x3}}}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:36 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 2: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0}) 17:10:36 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:36 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TRIM(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x22000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3f6, 0x100, 0x70bd25, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24008054}, 0x4000841) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x10, 0x30, 0xfa00, {&(0x7f00000006c0), 0x0, {0xa, 0x4e24, 0xfffffff7, @private2, 0x3}}}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:36 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:36 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r1, 0x1269, &(0x7f00000000c0)={0x4, 0x3, 0x34, &(0x7f0000000080)="f562b6dac2cd394ce7e05aed8fe7d6869043537c9a0377a0707c2681e7f881a0b9efee79baf2c6407cd36d6acb3556ae7cc11d95"}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000040)={r0, 0x2c, 0x0}, 0xfd81) 17:10:37 executing program 3: socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) 17:10:37 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TRIM(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x22000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x10, 0x3f6, 0x100, 0x70bd25, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x24008054}, 0x4000841) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r1, 0x1269, &(0x7f00000000c0)={0x4, 0x3, 0x34, &(0x7f0000000080)="f562b6dac2cd394ce7e05aed8fe7d6869043537c9a0377a0707c2681e7f881a0b9efee79baf2c6407cd36d6acb3556ae7cc11d95"}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0x2, &(0x7f0000000040)={r0, 0x2c, 0x0}, 0xfd81) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r2, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:37 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f0000000640)=0x20000000000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f00000000c0)={0x4, 0x3, 0x34, &(0x7f0000000080)="f562b6dac2cd394ce7e05aed8fe7d6869043537c9a0377a0707c2681e7f881a0b9efee79baf2c6407cd36d6acb3556ae7cc11d95"}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) 17:10:37 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f00000000c0)={0x4, 0x3, 0x34, &(0x7f0000000080)="f562b6dac2cd394ce7e05aed8fe7d6869043537c9a0377a0707c2681e7f881a0b9efee79baf2c6407cd36d6acb3556ae7cc11d95"}) 17:10:37 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 17:10:37 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:37 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$char_raw(&(0x7f0000000600)='/dev/raw/raw#\x00', 0x0, 0x10400) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 1: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 2: socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x20000006, 0x894d, 0x2}, 0x1c) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) msgget$private(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) r6 = gettid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x2, 0xee00, 0x0, r5, 0xee00, 0x10c, 0x81}, 0x0, 0x0, 0x80000001, 0x1000, 0x1, 0xffffffffffffff9f, 0xfe10, 0x5, 0x9, 0x9e, r6}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008040}, 0x800) 17:10:37 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)) 17:10:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 17:10:37 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) r6 = gettid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x2, 0xee00, 0x0, r5, 0xee00, 0x10c, 0x81}, 0x0, 0x0, 0x80000001, 0x1000, 0x1, 0xffffffffffffff9f, 0xfe10, 0x5, 0x9, 0x9e, r6}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008040}, 0x800) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x430, 0x3f4, 0x800, 0x70bd25, 0x25dfdbfb, {0x5, 0x2, 0x27, [0x0, 0x7fff, 0x0, 0x7, 0x5, 0x0, 0x5d5d, 0xffff, 0x1a, 0x3, 0x8, 0x1, 0x3, 0x4b6, 0x0, 0x9, 0x5, 0xffff, 0x0, 0x8f, 0xff, 0x10000, 0x7, 0xe6, 0xfffffffb, 0x618a, 0x9, 0x6662, 0x1249, 0x3, 0x1000, 0x1, 0x9, 0x0, 0x81, 0x2, 0x80, 0x9, 0x7f, 0x1, 0x8001, 0x8, 0xffff, 0x0, 0x4, 0x8, 0xfff, 0x3, 0x40, 0x7, 0x80, 0xffff, 0x1, 0x0, 0xffffffe1, 0x8, 0x7fffffff, 0x81, 0x4, 0x0, 0x0, 0x3, 0x6], [0x8, 0x0, 0x4741, 0x3, 0x6, 0xfffffff7, 0x1, 0x6, 0x401, 0x4, 0x9, 0x8001, 0x100, 0x8, 0x3, 0x40, 0x1f, 0x0, 0x81, 0x8, 0x1, 0xffffff80, 0xfffffff7, 0x9, 0x4, 0x10000, 0xa85, 0x5, 0x1, 0x100, 0x8, 0x6, 0x8, 0x100000, 0x6, 0x25, 0x101, 0x1, 0x6, 0x4, 0x6, 0x4, 0x0, 0x1, 0x7, 0x3f, 0xed0, 0x3f, 0x5, 0x3ff, 0x5, 0x4, 0x9, 0x7fff, 0x4, 0x8001, 0x1, 0xffff, 0x8, 0x7, 0x5, 0x5, 0xe77, 0xe33], [0x4, 0xc5ee, 0x200, 0x9, 0x1, 0x46, 0xd50e11cb, 0x7ff, 0x3, 0x6, 0xffffffff, 0x8, 0x8, 0x2, 0x7, 0x70, 0x400000, 0xfffffffd, 0x80000001, 0x101, 0xc3, 0x9, 0x471, 0x7, 0x3, 0x7, 0x9, 0x5, 0x400, 0x1, 0xffff, 0x4, 0x1000, 0x1, 0xd73, 0xffff2781, 0x5, 0x0, 0x3b06, 0x8, 0x2, 0x5, 0x1ff, 0x81, 0x1, 0x4, 0x6, 0x4, 0x6, 0x8, 0x0, 0x3, 0x80000000, 0x7cb, 0x7, 0x7, 0x9, 0xd5fb, 0x1, 0x6, 0x7ff, 0x5, 0xffff, 0x7ff], [0x2, 0x2e1, 0x1f, 0x401, 0x4, 0x8, 0x83e, 0x1, 0x1, 0x8, 0x4, 0x3ff, 0x286, 0x6e, 0x0, 0x3, 0x621, 0x580, 0x5, 0x1, 0x401, 0x40, 0x5, 0x1, 0x6, 0x1, 0xffff112a, 0x8, 0x0, 0x7fff, 0xd7d, 0x5, 0x8, 0x529, 0xb58c, 0x8, 0x80, 0x5, 0x1, 0x0, 0x401, 0x9, 0x0, 0x85f, 0x400, 0x40, 0xcf90, 0x4, 0x9, 0x4, 0x2, 0x1, 0x2, 0x3, 0x9, 0x8001, 0x90, 0x7, 0x1, 0x6242, 0x6, 0x8, 0x3e534281, 0x80], 0xe, ['@)\'\x00', '\']\'\'&\\^&$\x00']}, [""]}, 0x430}, 0x1, 0x0, 0x0, 0x40000}, 0x20004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000)=0x4, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:37 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) r6 = gettid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x2, 0xee00, 0x0, r5, 0xee00, 0x10c, 0x81}, 0x0, 0x0, 0x80000001, 0x1000, 0x1, 0xffffffffffffff9f, 0xfe10, 0x5, 0x9, 0x9e, r6}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp6=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x24008040}, 0x800) 17:10:37 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:37 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000)=0x4, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 17:10:37 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:37 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) r6 = gettid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x2, 0xee00, 0x0, r5, 0xee00, 0x10c, 0x81}, 0x0, 0x0, 0x80000001, 0x1000, 0x1, 0xffffffffffffff9f, 0xfe10, 0x5, 0x9, 0x9e, r6}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) 17:10:37 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:38 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$inet_dccp_int(r0, 0x21, 0xb, &(0x7f0000000000)=0x4, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x1c) 17:10:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x894d, 0x2}, 0x1c) 17:10:38 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) r5 = gettid() msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x2, 0xee00, 0x0, r4, 0xee00, 0x10c, 0x81}, 0x0, 0x0, 0x80000001, 0x1000, 0x1, 0xffffffffffffff9f, 0xfe10, 0x5, 0x9, 0x9e, r5}) 17:10:38 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0xe}, {0x0, 0x7}, {0x1, 0x5}, {0xf}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xd3, 0xfe, 0x1}, 0x20) 17:10:38 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) 17:10:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x1c) 17:10:38 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) gettid() 17:10:38 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:38 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x48044, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) getpeername$packet(r1, 0x0, 0x0) 17:10:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffedd, 0x3b}, 0x20) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) 17:10:38 executing program 1: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@initdev, @in6=@initdev}}, {{}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) gettid() 17:10:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) getpeername$packet(r1, 0x0, 0x0) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) getpeername$packet(r1, 0x0, 0x0) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) r2 = socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x18, 0x3f9, 0x0, 0x70bd26, 0x25dfdbff, {0x1, 0x1}, ["", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x84}, 0x8000) 17:10:38 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x200000, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000400)={r5, 0x1, 0x6, @multicast}, 0x10) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) 17:10:38 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010102}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'dummy0\x00'}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x863}, 0x40) 17:10:38 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x200000, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000400)={r5, 0x1, 0x6, @multicast}, 0x10) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) 17:10:38 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) 17:10:38 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x200000, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000400)={r5, 0x1, 0x6, @multicast}, 0x10) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:38 executing program 1: bpf$BPF_BTF_LOAD(0x14, 0x0, 0x0) 17:10:38 executing program 4: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) 17:10:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}, @struct={0x6, 0x2, 0x0, 0x4, 0x0, 0x6, [{0xc, 0x0, 0xfe0}, {0x4, 0x3, 0x3183e8f1}]}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0xa7, 0xfe, 0x1}, 0x20) 17:10:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:38 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x200000, 0x0) 17:10:38 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:38 executing program 1: bpf$BPF_BTF_LOAD(0x14, 0x0, 0x0) 17:10:38 executing program 4: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) 17:10:39 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) socket(0x2b, 0x5, 0x7) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}, @fwd={0xd}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x83, 0xfe, 0x1}, 0x20) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) 17:10:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x14, 0x0, 0x0) 17:10:39 executing program 4: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) 17:10:39 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @remote}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'wg0\x00'}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x40c0094) socket(0x2b, 0x5, 0x7) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}, @ptr={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x77, 0xfe, 0x1}, 0x20) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) 17:10:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:39 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000600)) socket(0x2b, 0x5, 0x7) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x9}}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x6b, 0xfe, 0x1}, 0x20) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) 17:10:39 executing program 0: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0xa09, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x40040) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @volatile={0xa, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x53, 0xfe, 0x1}, 0x20) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:39 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bsg\x00', 0x80000, 0x0) socket(0x2b, 0x5, 0x7) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x47, 0xfe, 0x1}, 0x20) 17:10:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) 17:10:39 executing program 1: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:39 executing program 3: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4000040) socket(0x2b, 0x5, 0x7) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @ptr={0x5, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x3b, 0xfe, 0x1}, 0x20) 17:10:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) keyctl$get_persistent(0x16, r2, 0x0) 17:10:39 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') socket(0x2b, 0x5, 0x7) 17:10:39 executing program 1: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r1 = accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req3={0x3, 0x0, 0xff, 0x1, 0xfffffeff, 0x400, 0x3ff}, 0x1c) 17:10:39 executing program 3: socket(0x2b, 0x5, 0x7) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) keyctl$get_persistent(0x16, r2, 0x0) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:39 executing program 4: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) accept$packet(r0, &(0x7f00000000c0), &(0x7f0000000040)=0xfffffffffffffc88) 17:10:39 executing program 3: socket(0x0, 0x5, 0x7) 17:10:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:39 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) keyctl$get_persistent(0x16, r2, 0x0) 17:10:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:40 executing program 0: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) 17:10:40 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r2) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:40 executing program 3: socket(0x0, 0x5, 0x7) 17:10:40 executing program 2: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r2) 17:10:40 executing program 0: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) socket$packet(0x11, 0x3, 0x300) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:40 executing program 3: socket(0x0, 0x5, 0x7) 17:10:40 executing program 2: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r1) 17:10:40 executing program 0: socket$packet(0x11, 0x2, 0x300) openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 2: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:40 executing program 3: socket(0x2b, 0x0, 0x7) 17:10:40 executing program 0: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x43200, 0x0) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:40 executing program 2: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:40 executing program 0: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:40 executing program 2: msgget$private(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 17:10:40 executing program 3: socket(0x2b, 0x0, 0x0) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:40 executing program 0: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:40 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r1) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x2d, 0xfe, 0x1}, 0x20) 17:10:40 executing program 0: openat$proc_mixer(0xffffffffffffff9c, 0x0, 0x43200, 0x0) 17:10:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:40 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r1) 17:10:41 executing program 0: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r1) 17:10:41 executing program 0: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x22, 0xfe, 0x1}, 0x20) 17:10:41 executing program 0: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x21, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x20, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x1f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x1d, 0xfe, 0x1}, 0x20) 17:10:41 executing program 3: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x1c, 0xfe, 0x1}, 0x20) 17:10:41 executing program 2: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:41 executing program 3: msgget$private(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 17:10:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x1b, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 2: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x2d, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe}, 0x20) 17:10:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, r0) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:42 executing program 3: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe}, 0x20) 17:10:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: msgget$private(0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/cgroup\x00') keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x16, 0x0, 0x0) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x2d, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xb, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2f, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict={0x6}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x30, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict={0x6}]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x2d, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0]}}, &(0x7f0000000880)=""/254, 0x2d, 0xfe, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x2b, 0x0, 0x1}, 0x20) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x6}]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe, 0x1}, 0x20) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xb}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000880)=""/254, 0x23, 0xfe, 0x1}, 0x20) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@restrict={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/254, 0x2b, 0xfe}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000880)=""/254, 0x2c, 0xfe, 0x1}, 0x20) 17:10:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict={0x6}]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x1e, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:46 executing program 1: msgget$private(0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/cgroup\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) keyctl$get_persistent(0x16, r2, 0x0) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:46 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000001c0)=""/241, &(0x7f0000000100)=0xf1) socket$kcm(0x29, 0x5, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x29, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x0, 0x2d, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x81) r4 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r4, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x1f, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 17:10:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) [ 591.611936] device batadv_slave_1 entered promiscuous mode 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x1f, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 591.664148] device batadv_slave_1 left promiscuous mode 17:10:46 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:46 executing program 4: bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x10) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x30, 0x61, 0x30, 0x6f, 0x2e]}}, &(0x7f0000000880)=""/254, 0x1f, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:46 executing program 4: bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x10) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@restrict]}, {0x0, [0x30, 0x61, 0x30, 0x6f]}}, &(0x7f0000000880)=""/254, 0x2a, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:46 executing program 4: bpf$BPF_GET_BTF_INFO(0x4, 0x0, 0x10) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={0x0, &(0x7f0000000880)=""/254, 0x0, 0xfe, 0x1}, 0x20) 17:10:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@restrict]}, {0x0, [0x30, 0x61, 0x30]}}, &(0x7f0000000880)=""/254, 0x29, 0xfe, 0x1}, 0x20) 17:10:46 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 17:10:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000640400022ac48a241bdbdf25ad5c0dda16f0b56abc881848d7c91913bf23bbb58b2dec3440144a5aa2bad77d8fd996094a1596ef290b257f4de9ae654fb784f3b54d0000"], 0x48}}, 0x8000) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) getpeername$packet(r0, 0x0, 0x0) 17:10:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@restrict]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000880)=""/254, 0x28, 0xfe, 0x1}, 0x20) 17:10:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 17:10:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x30]}}, &(0x7f0000000880)=""/254, 0x27, 0xfe, 0x1}, 0x20) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 17:10:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000640400022ac48a241bdbdf25ad5c0dda16f0b56abc881848d7c91913bf23bbb58b2dec3440144a5aa2bad77d8fd996094a1596ef290b257f4de9ae654fb784f3b54d0000"], 0x48}}, 0x8000) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) getpeername$packet(r0, 0x0, 0x0) 17:10:47 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000880)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe, 0x1}, 0x20) 17:10:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000640400022ac48a241bdbdf25ad5c0dda16f0b56abc881848d7c91913bf23bbb58b2dec3440144a5aa2bad77d8fd996094a1596ef290b257f4de9ae654fb784f3b54d0000"], 0x48}}, 0x8000) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) getpeername$packet(r0, 0x0, 0x0) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000640400022ac48a241bdbdf25ad5c0dda16f0b56abc881848d7c91913bf23bbb58b2dec3440144a5aa2bad77d8fd996094a1596ef290b257f4de9ae654fb784f3b54d0000"], 0x48}}, 0x8000) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 17:10:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000380)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:47 executing program 3: msgget$private(0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x1, 0x9, 0x7, 0x7a}, {0x3fb, 0x2a, 0x4, 0x92ff}, {0x0, 0x4, 0x3, 0xb68}, {0x1f, 0x22, 0x7f, 0x2}]}, 0x10) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/133) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00') ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f000000b500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f000000b4c0)={&(0x7f0000000200)=@delchain={0xb2c0, 0x65, 0x200, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xfff3, 0x4}, {0xfff3, 0x3}, {0xfff3, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x53bc, 0x2, [@TCA_BASIC_ACT={0x93c, 0x3, [@m_simple={0x11c, 0x1b, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x8c, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x5, 0x6, 0x1}}, @TCA_DEF_PARMS={0x18, 0x2, {0x2, 0x8, 0x5, 0x0, 0x2}}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x6, 0x3, '*\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x7fff, 0x7, 0x10000000, 0x4, 0x10001}}]}, {0x68, 0x6, "65499bddfc116c456f8d37b0d0986a0c1d825db80fbc24d7b5b0f28837c2766453ca7d74e065838703e027f1aa6518b2b32c22d4efd5614a300bed8673f44c16b92c51564039b6a8d50ad602e66e2cc0d8e560af4b85fe3762987596b8a98ebbf0f4a105"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x7, 0x1}}}}, @m_xt={0x2c8, 0xf, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1c0, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x127, 0x6, {0x8, 'security\x00', 0x5, 0x2a, "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"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x4}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_HOOK={0x8, 0x2, 0x4}, @TCA_IPT_TARG={0x2a, 0x6, {0x9, 'security\x00', 0x4, 0x401}}]}, {0xe1, 0x6, "940d680e59993e075ef76632dd48e0146e464865fec1a7f437955a081502150d8344288c0daf20211c9a54c4aa16198dd198852ae6d57b6bba3f2d63c9b6481933fd8ba8c3df820869bc1db0ed9c83799dfca70dd6ab4794049c138f02d5969996de5e6bfed459ca09f21c1e4dbb984bbf7a4600de01805d3462583c3a5eeb08f2f616696c1b3854494886679ebde7355d8628eba050f7c16abe7ec908b353a99718a6a7b01de9ab0030200e91538c94d09d6fa37d5d6f0abf8fe270efa0bc270a9405c1aca0ab3896a3f78f337025647ba398232b47275f084a67aa66"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_simple={0x108, 0xf, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x6, 0xd9c1, 0x8, 0x5, 0x8}}, @TCA_DEF_DATA={0xa, 0x3, '-(/(,\x00'}]}, {0xb8, 0x6, "36047f9bccac23f6b7eaf91fafd59c03f5dee32bb2dd6cf9d4a6a803f7bf042be0f90e2a85be1311ba1ef809accf85d0522b9030e219c4e9e3144c5418bce4b6020e5ddfb86ec0c07b9936046395c44277c96bfed56a04de6b049ab12a30d64fda1055866444fc224c390137c57f3d1215022d1886de6592e9d1beec27ed014b5d7e2336fd3787b221fa028f10fa9b286402c0b15b0f14619bfef3064ec01ab97c3cf8343aac823eb9e96d16af0c9c01f8798f3e"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_nat={0xa0, 0x1f, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x7, 0x7, 0x5, 0x100, 0x1}, @multicast1, @multicast1, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x9, 0x1, 0x5, 0x9}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3a}, 0xffffff00}}]}, {0x28, 0x6, "6c941945a2292182e280dbc388e545d648065ec838fd0a666a343ae2024c9ccdb1185ba1"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_ct={0x134, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_ZONE={0x6, 0x4, 0x5}, @TCA_CT_ACTION={0x6, 0x3, 0x2}, @TCA_CT_LABELS_MASK={0x14, 0x8, "f432d61a2f4d9285835c9c2d1be0bf30"}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e23}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e21}]}, {0xd6, 0x6, "920e9c79bd7f2e55a3130d23fc0b360e6b831cdaf2e9d623d43685fd2ecd18d83ad5bbcc712f03b6cb0569a69705269707b475fa77561477f87283220461080cc6a73778ae8f8e94ada200b841811fa0a16dd7d2b285eb2d706e0ec5d8c072c138e08f33a754d0ae137dcc8d5cf5bfcb3771e7601a247f126552ffbd85d75fbeef3bc3b1d01cac06cc30bc0f914a2d490c870bb0df6b3754ab2f1a43fd6f268a7b43cd065b62cad6ff54394fa7f8c4fbe5ceaa9d65623dd1d15ec8746003b81ff7a8c825ddf8766a57e7b3bf0e8acbcc2aaa"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x5, 0x1}}}}, @m_csum={0x188, 0x1d, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xff, 0x1, 0x0, 0x2, 0xc0}, 0x11}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x40, 0x9, 0x5, 0x8, 0x1}, 0x3d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x20, 0x6, 0x2, 0x3}, 0x2d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x200, 0x0, 0x0, 0xfffffffc, 0x3}, 0x5c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x81, 0x1, 0x10000000, 0x297, 0x1}, 0x3a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0xc255, 0x4, 0x80, 0x10000}, 0x50}}]}, {0xb2, 0x6, "464ba07009b7ec90f337c35bcddc9c4054177f761f4402470bd8b2fdef9920bcc6cf4b977914339b31058316cda7b3f5073e55357b41ca1342a169e9ad799060b74c527af8237db670d99ee645f58506334f2b480ccc3db7c37f319d1198fc578ee980be578013d1e26fbfdbe03658abd248cbc2a064ee3f4b96a2fd31f35c182597b3c29bf78cade65d9964784482b513c40d12082fbad0c054bc786d29b082c9d9be3ffc04f641f647a8f7f82a"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_simple={0xf0, 0xc, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x81, 0x1, 0x5, 0xfffffffa, 0x5}}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}]}, {0x71, 0x6, "d61cb4d6be48f3bd0ec2b0072b443918136544c9e267a949aa845bb80d81bf7eef433f423a1194a870dafe8067c27fd20a7fdf4c78eab89e8c922f3dc5e2b5c7a1c8f509602ace8f2a0f918f93fe7e933293a66c337a9cc53a1b9e426f16aa520473f2664048ae3bb97ecf2583"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_BASIC_POLICE={0x8bc, 0x4, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6914932e}, @TCA_POLICE_TBF={0x3c, 0x1, {0xe340, 0x10000000, 0x4, 0x2, 0x0, {0x5, 0x0, 0xfe00, 0x1, 0xfff}, {0x3f, 0x1, 0x0, 0x9, 0x9, 0x5}, 0x101, 0x3f, 0x3}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xfffffffffffffffd}, @TCA_POLICE_TBF={0x3c, 0x1, {0x9, 0x4, 0x315c, 0x3, 0xc9, {0x3f, 0x2, 0x1, 0x23b5, 0x5, 0xfb}, {0x7f, 0x1, 0x4, 0x3, 0x200, 0x8f}, 0x1ff, 0x2, 0xfffffff9}}, @TCA_POLICE_RATE={0x404, 0x2, [0x400, 0x0, 0x89f2, 0x5da, 0x7, 0xfffffff8, 0x7ff, 0x2, 0x3, 0x0, 0x652, 0x3, 0x5, 0x4c, 0x8, 0x8, 0x4, 0x6, 0x73000, 0x8001, 0x4, 0xd90, 0x9, 0x2fc0, 0xf3f, 0x5, 0x59, 0x0, 0x7, 0x9, 0xfffff887, 0x5, 0x1, 0x5, 0x7, 0x0, 0x2, 0x2, 0xfbb, 0x8, 0xffffffff, 0xbecc, 0x5, 0x1, 0x5, 0x3b, 0x76, 0x7f, 0x8, 0x0, 0x4, 0x9, 0x7, 0xd7a2, 0xffffffc0, 0x7fffffff, 0x7ff, 0x7e0000, 0x1000, 0xff, 0x9, 0x7bf, 0x3, 0x2, 0x100, 0xffffffc1, 0x3f, 0x401, 0x7, 0xd6, 0x8, 0x6, 0x5, 0x0, 0x9, 0x40, 0x2, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0x9, 0x3, 0x7fff, 0xfb1b, 0x2, 0xfff, 0x6, 0x800, 0x4, 0xffffffff, 0x3, 0x4, 0x400, 0x8, 0x3f, 0x80, 0x2, 0x6, 0x2, 0xce6, 0x5, 0x5, 0xff, 0x8000, 0x3, 0x3, 0x5, 0x2, 0x20, 0x400, 0x0, 0x9, 0xfffffffe, 0x9, 0x7, 0x7, 0x5, 0x6, 0x2, 0x9, 0xfffffff9, 0x2, 0x10001, 0x0, 0x81, 0x7, 0x7fff, 0xdf0, 0x0, 0xd3, 0x6, 0x6, 0x6, 0xff, 0x0, 0x8, 0x2, 0x3, 0x7f, 0x3, 0x40, 0x7, 0x101, 0x8, 0x7, 0x5b59dfce, 0x8, 0x640f, 0x9f3e, 0x9, 0x6655, 0x4040, 0x1, 0x7f, 0x6, 0x7f, 0x41, 0x1000, 0x8, 0x89, 0x7f, 0x1, 0x0, 0xc6, 0x2, 0x401, 0x7, 0x4c, 0xdf, 0x7fff, 0x6, 0x1, 0x5, 0x5, 0xcb2e, 0xfffff001, 0xe, 0x200, 0x752, 0x2, 0x8, 0x6, 0x5ff3, 0x3, 0x7, 0x9, 0xfffffffe, 0x6, 0x10000, 0xb7e5, 0x5, 0x4, 0x7fff, 0xce, 0x7, 0x1, 0x2, 0x8, 0x1f, 0x8001, 0x3, 0x31ef, 0x2, 0x7, 0x2, 0x200, 0x10000, 0x3, 0x81, 0xf6, 0x40, 0x59, 0x0, 0x1, 0x40, 0xffff, 0x1, 0x0, 0xd83, 0x541e, 0xfffffffe, 0x1ce, 0x37, 0xdeb0, 0x1, 0x50, 0x1, 0xc7, 0x2, 0x8, 0x20, 0x4, 0x400, 0x10001, 0x2, 0x0, 0x3, 0x80, 0x6, 0x7fffffff, 0x80, 0x2, 0x1ff, 0x10c1, 0xfffffff9, 0x6, 0x81, 0x1000, 0x5, 0x80000001, 0x200, 0x3, 0x6, 0x20000000]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x472}, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x8b, 0x1000, 0x2, 0x2, 0x0, 0x7, 0x5052, 0x8000, 0x7, 0x7ff, 0xffffffff, 0xfffffffe, 0x9b, 0xbe64, 0x8, 0x8, 0x8, 0x303, 0xd, 0x10000, 0x5, 0x7, 0x5, 0x8000, 0xff, 0x1f, 0x7, 0x100, 0x2000, 0x2bf80000, 0xfffffff9, 0x7, 0x3, 0x19e4, 0x6, 0x1000, 0xfff, 0x10000, 0x1ff, 0x0, 0x800, 0xfffffff8, 0x9, 0xcb, 0x1f, 0x6, 0x20, 0xfffffc01, 0x9, 0x800, 0x0, 0xa, 0x7ff, 0x0, 0x4, 0x2, 0x80, 0x6, 0x800, 0x6, 0x5, 0xfffffff9, 0x9, 0x80, 0x5, 0x7f, 0xfb, 0x7, 0x7, 0x80, 0x24000, 0xdeb, 0x8000, 0x7, 0x4, 0x1, 0x3, 0x1, 0x9, 0x5, 0x7, 0x4a40, 0x7, 0x6, 0x101, 0x8, 0x6, 0x400, 0x2, 0x2, 0x0, 0x400, 0x1, 0xffff, 0x2, 0x8, 0x3, 0x3, 0x9, 0x8, 0x10, 0x51, 0x8, 0x8, 0x0, 0xf79b, 0x20, 0x0, 0x3, 0x9, 0xc8, 0x704, 0x6, 0x3, 0x7115, 0x20, 0x8, 0x6, 0x2, 0x3, 0x40, 0x8, 0x2, 0x3, 0x9f, 0x2, 0x6, 0x6b, 0x4, 0x6, 0x6, 0x8, 0x20, 0x2, 0x4, 0x5, 0x2, 0x9, 0x8, 0xb4b, 0x7fffffff, 0x3f, 0x5, 0x1bf, 0x2, 0x0, 0x4, 0x5, 0x7a5bf4d4, 0x2, 0x1, 0x3, 0x100000, 0x5, 0x3, 0x18000000, 0x3f, 0x7, 0x6, 0x1d, 0x9, 0xffff, 0x100, 0x6, 0xcb, 0x8, 0x10000, 0x4, 0x7, 0x2, 0x7, 0x1f, 0x5, 0x0, 0x6, 0x0, 0xfffffff6, 0x9, 0x5, 0x1, 0x9, 0x6, 0x1000, 0x1000, 0x3, 0x5dd, 0xa4a5, 0x8001, 0x8, 0x9, 0x3ff, 0x0, 0x9, 0x1, 0xf7, 0x5, 0x9, 0x1000, 0xfffffffa, 0x8, 0x3, 0x1, 0x4, 0x5, 0x4f928da1, 0x1000, 0xa6, 0x3ff, 0x3, 0x2, 0x3, 0x7, 0x3, 0x5, 0xe24, 0xfffffffc, 0x7fe00, 0xfffffff7, 0x3, 0xc0000000, 0x6, 0x80000001, 0x6, 0x4f7, 0x1, 0x8, 0x1, 0x2, 0x96, 0x9, 0x8, 0x80, 0x6, 0x5, 0x1f, 0x5, 0x1, 0x4fef, 0x2, 0xba, 0x6, 0xee94, 0x6, 0x9e, 0x1000, 0x0, 0x0, 0x401, 0x2, 0x38, 0x6, 0x6, 0x80000001, 0x0, 0x4]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3}, @TCA_POLICE_RESULT={0x8, 0x5, 0x80000000}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x3, 0x6}}, @TCA_BASIC_ACT={0x41b8, 0x3, [@m_ife={0x94, 0x1e, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x1c, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x6}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x401}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x8}]}]}, {0x4f, 0x6, "7ff7ffa60f2b0ac8b6816978c8149553b505d3615f411a58927796e43eddfdfdc98b5845cd6ea097f58367415005d18c2923154860467fb767f33fc69127c6927c33129c31d63e2d790da0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_pedit={0x3b08, 0x1f, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x3a7c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xeb0, 0x4, {{{0x0, 0x9, 0x0, 0x5, 0x1}, 0x1, 0x0, [{0x1f, 0xfffffff7, 0x4, 0x81, 0x81, 0x4}, {0x3, 0x400, 0x7, 0x101, 0x24, 0x8}, {0x5, 0x40, 0x1000, 0x0, 0x3ff, 0x7}, {0x6, 0x9, 0x7, 0x10000, 0x1, 0xfffffff7}, {0x282b, 0x7ff, 0x6, 0x800, 0x1, 0x10000}, {0x0, 0x81, 0x77c, 0x200, 0x0, 0x8001}]}, [{0x9, 0xb57, 0x7ff, 0x1, 0x4, 0x10000}, {0x7, 0x10001, 0x99, 0x2, 0xff, 0x7}, {0x0, 0x10001, 0x8000, 0xae77, 0x7, 0x6}, {0xfffffffd, 0x100, 0x8001, 0x20, 0x50, 0xfffff001}, {0x6, 0xcc, 0x15, 0xb0f4, 0x1f, 0xc7}, {0x7933, 0x0, 0x499, 0x80, 0x6, 0x4d}, {0x9, 0x400, 0x40, 0x7, 0x6, 0x800}, {0x80000001, 0x2, 0x10001, 0x5, 0x5408, 0x9}, {0x1, 0x7, 0x2, 0xfff, 0x6, 0xd3b96b3}, {0xeb91, 0x3fc, 0xfffff000, 0x8883, 0x200, 0x6}, {0x5, 0x10001, 0x5, 0x7b8, 0x8, 0x7fffffff}, {0x2, 0x10, 0x1, 0x6377, 0x1000, 0x1c}, {0x1, 0x2, 0x3, 0x9, 0x8001, 0x1}, {0x1, 0xa29, 0x1, 0x5, 0x3a78, 0xad8}, {0x5, 0x0, 0xc078, 0x1f, 0x7, 0x7}, {0xffff, 0x6, 0x5, 0x0, 0x2}, {0x2, 0x101, 0x1, 0x5, 0x0, 0x3}, {0x699e, 0x2400000, 0x4, 0x4, 0x5, 0x3}, {0x3, 0x9431, 0x200, 0xffffffe0, 0x9, 0x5}, {0x9, 0x0, 0x7, 0x4, 0x2b8c, 0x7}, {0xfffffffa, 0x1ff, 0x1, 0x70, 0x9, 0x5}, {0xffffda79, 0x2, 0x0, 0x81, 0x2, 0x80000001}, {0x0, 0x80000001, 0x7, 0xfffffeaf, 0x6, 0x2}, {0x1, 0x0, 0x5, 0xfffffff7, 0x5a, 0x2}, {0x0, 0x0, 0x101, 0x80, 0x0, 0x6}, {0x7, 0xd13c, 0x2, 0x7, 0x7, 0xffffffff}, {0x8, 0x0, 0x3, 0x5, 0x800, 0x5}, {0x8, 0x7fffffff, 0xda9c, 0x3ff, 0x800, 0xffffffe0}, {0x80, 0x80, 0x899, 0x7, 0x10000, 0x5}, {0x1, 0xd8e6, 0x7fff, 0x10000, 0x39, 0x2}, {0x1c, 0x7fffffff, 0xafe8, 0x7fffffff, 0x6, 0x5a}, {0x6956, 0x7, 0x101, 0x4, 0x4, 0x6}, {0x2ea52831, 0x3c9a, 0x1, 0x1, 0x100, 0x81}, {0x6, 0x80, 0x3, 0xff, 0x80000000, 0x200}, {0x3, 0xad7, 0x3fd2, 0x21, 0x61, 0x1}, {0xfff, 0x3f, 0x2, 0x0, 0x1, 0x500000}, {0x4, 0x80, 0xa, 0x6980, 0x10001, 0x4472}, {0xffff, 0x5, 0x3, 0x4, 0x3f, 0x2}, {0x40, 0x6, 0x2, 0x400, 0x65, 0x3}, {0x80000000, 0x6ae, 0x9, 0x4, 0x5, 0x3}, {0x9, 0x2, 0x1, 0x5, 0x8000, 0x3f}, {0x5, 0x18, 0x0, 0x60, 0x10000}, {0x7ff, 0x140000, 0x8, 0x8, 0x2, 0x3}, {0x0, 0xfffff801, 0x0, 0x7fff, 0x0, 0x1}, {0x7, 0x80000001, 0x21b9, 0x7fff, 0xa78, 0x2a}, {0x7f, 0x9, 0x1deb, 0x2, 0x40, 0x8000}, {0x0, 0x59, 0x5, 0x7, 0xe5, 0x10000}, {0x7, 0x2, 0x100, 0x7fffffff, 0x6b29, 0x400}, {0xfffffffe, 0x114, 0x1, 0x2, 0x2, 0x7e8a}, {0x8, 0x1f, 0x9, 0x6, 0x10001, 0x7fff}, {0xfffffffa, 0x9, 0xa1e8, 0xffffffff, 0x100, 0x3}, {0x10001, 0xde2, 0x7, 0x3, 0x7f, 0x1ff}, {0x4513, 0xffed, 0xc86492d, 0x3, 0xedf, 0x96000000}, {0xffff, 0x185, 0xfffffffb, 0x80, 0x7, 0x5}, {0x1, 0x9, 0x4, 0xda, 0x1, 0x80000001}, {0x9, 0x2, 0x6, 0x5, 0x7, 0xffffffff}, {0xffffffff, 0xffff0000, 0x20, 0x4, 0x0, 0x5}, {0x10000, 0x8001, 0x80000001, 0xb05b, 0xd74, 0x4000}, {0x8001, 0xe2, 0x3, 0x400, 0xfffff001, 0x80000000}, {0x80000000, 0x3, 0x8000, 0x1f, 0x101, 0x9fa1}, {0x9, 0x1, 0x2, 0x10000, 0x9, 0x8001}, {0x5, 0x9, 0x1, 0x3, 0x8000, 0xfffffff8}, {0x0, 0x8, 0x0, 0x0, 0x5, 0x4}, {0x29d, 0x5, 0x0, 0x4, 0x10000, 0xc82}, {0x9, 0x4, 0x7f, 0x7, 0x4, 0x5}, {0x7fffffff, 0x97, 0x1, 0x1f, 0xffffffff, 0x8}, {0x7, 0x4, 0x7fffffff, 0x2, 0x0, 0xb9}, {0x10001, 0x2, 0x5, 0xffffffff, 0x63, 0xffff}, {0xaeee, 0x2, 0x4a5b, 0x8, 0x6ea, 0x8}, {0x10001, 0x24000000, 0xffc0, 0x4, 0x6, 0x3}, {0x7, 0x3, 0x5, 0x10001, 0x4, 0x7}, {0x7ff, 0x54, 0x9, 0x7, 0x0, 0x2}, {0x51, 0xee85, 0x7, 0xfe4a, 0x2466, 0x66f}, {0xdcfe, 0x3ff, 0x200, 0x1, 0x81, 0xff}, {0x8000, 0x6, 0x7f, 0x4, 0x8, 0x9}, {0x401, 0x10000, 0x5, 0x1, 0xbb0, 0x3}, {0x2, 0x4, 0x5, 0xfffffd3b, 0x6, 0x5}, {0x5, 0x7f, 0x5, 0x5, 0xfffff000, 0x100}, {0x77, 0x1, 0x8000, 0x81, 0x6, 0x9}, {0x220, 0x100, 0x1, 0x4, 0x5, 0x6}, {0x2, 0x1, 0xffffffff, 0x7, 0x3, 0xffffff11}, {0x2, 0x2, 0x3, 0x1, 0x0, 0xb0}, {0x5, 0x8, 0x5, 0x5, 0x7fff, 0x7e1af79d}, {0x7, 0x7, 0x3ff, 0x2, 0x7, 0x6}, {0x8, 0x0, 0x4776, 0x5ae1ac96, 0x1ff, 0x57d}, {0x4, 0x7, 0x20, 0x56eb62f6, 0x6, 0x7}, {0xfffffffd, 0x0, 0xc3, 0x101, 0x8, 0x8}, {0x1000, 0x8, 0x6, 0x21, 0x4, 0xd04}, {0x5, 0x3, 0x6, 0x1, 0x100, 0x3ff}, {0x5, 0x4, 0x4, 0x7, 0x6}, {0x10000, 0x0, 0x3, 0x71, 0x6, 0x8000}, {0x6, 0xe, 0x2, 0x7, 0xff, 0x1ff}, {0x6, 0x9, 0xfd, 0xf2, 0xe82}, {0x1, 0x7, 0x1ff, 0x5, 0x6}, {0x10001, 0x4, 0x8000, 0x8000, 0x7, 0x8}, {0x6, 0x4, 0x3, 0x80, 0xe99, 0x40}, {0x1, 0x6, 0x7584, 0xfffffff9, 0x4, 0xfffffff8}, {0x4, 0x4d9, 0x7ff, 0x5, 0x2, 0x4}, {0x8, 0x0, 0x0, 0x1, 0x7ff, 0x2}, {0x1, 0xc25b, 0x101, 0x401, 0x5, 0x10000}, {0x4, 0x1, 0xde5b, 0x5, 0x3}, {0x9, 0x3, 0x4, 0xba, 0x1, 0xfffffff8}, {0x8, 0x0, 0x3, 0xe35, 0x81, 0x10001}, {0x8001, 0x200, 0x800, 0xa1, 0x16, 0x80000000}, {0x3, 0xa45f, 0xffffffff, 0x0, 0x1, 0xa8}, {0x6, 0x5000000, 0x4, 0x0, 0xffffffff, 0x4}, {0x44ed, 0x1, 0x81, 0x4, 0x3}, {0x40, 0x9, 0x86, 0x80, 0x2, 0x5}, {0x60fc, 0xfffffffd, 0x2, 0x0, 0x2, 0x1ff}, {0x1, 0x5, 0x800, 0x6, 0x3f, 0x78c}, {0x10000, 0x4, 0x6, 0xffff8001, 0x8, 0x6}, {0x401, 0xffff, 0x0, 0x5, 0x8, 0x4}, {0x40, 0x3, 0x81, 0x0, 0x3, 0x7}, {0xfff, 0x92, 0x0, 0x1, 0x1, 0x10001}, {0x8, 0x8, 0x5, 0x2, 0x35be, 0x7ed9}, {0x2, 0x7fffffff, 0x9, 0x0, 0x0, 0xfffffff9}, {0x5, 0x1ff, 0x5, 0x0, 0x7, 0xfff}, {0x5, 0x5, 0x20, 0x8, 0x81, 0x200}, {0x5aaaa802, 0x6, 0xb01c, 0x9, 0x400, 0x23}, {0xaa3, 0x3, 0x2, 0xa8f, 0x3, 0x40}, {0x7, 0x7, 0x7fff, 0x4, 0xffffffe1, 0x3f}, {0x40, 0x6, 0x3, 0x0, 0x141, 0x7}, {0x2, 0x18, 0x8, 0x3, 0x40000, 0x7ff}, {0x4, 0x3, 0x6, 0x7, 0x7, 0x5}, {0x4, 0x43, 0x1f, 0x4, 0x8, 0xfffeffff}, {0xffffff00, 0x6, 0xffff, 0x4, 0x3ff, 0xfffffffb}, {0x239d, 0x10001, 0x400, 0xb6b7, 0x8, 0x2}, {0x6, 0x5, 0x0, 0x1, 0x100, 0xc0}], [{0x3}, {0x3}, {0x5}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {}, {0x7, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {0x4}, {0x3}, {0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x5}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0x1}, {0x2, 0x1}, {0x4}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x2}, {}, {0x3, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0xbc2db4ec54a9ef1c}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x4}, {0x2}, {}, {0x2, 0x1}, {0x4}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x1, 0x1}, {0x5}, {0x5}, {0x4}, {0x1}, {0x1}, {0x4}, {0x3, 0x1}, {0x1}, {0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x7}, {0x1, 0x1}, {0x4}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x4}, {0x2}, {0x5}, {0x1}, {0x3, 0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0xc21eece3aa97cb6b}, {0x5}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x1}, {0x5, 0x1}, {0x2, 0x1}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe80, 0x4, {{{0x101, 0xff, 0x6, 0x5, 0xffff}, 0x0, 0x1, [{0x4, 0x81, 0x8, 0x10001, 0x6319, 0x49898502}, {0x401, 0x8, 0xfffffffa, 0x8, 0xde4}, {0xffff36b5, 0x9, 0x7fff, 0x7, 0x7f, 0x30}, {0x6f, 0x0, 0x3, 0x8, 0x9, 0x874}]}, [{0xa5, 0x3f, 0x3, 0x7fff, 0x7, 0x3}, {0x81, 0x2, 0x6, 0x900, 0x10040, 0x7fffffff}, {0x8, 0x120, 0x9, 0xffffff80, 0x9, 0x80}, {0x8, 0x0, 0x3, 0x100, 0x7f, 0x4}, {0x0, 0x9, 0x5, 0x7f, 0x5, 0x64339c2e}, {0x1f, 0x1, 0x2, 0x8, 0x0, 0x7f}, {0x8, 0x5, 0x58e4, 0x3, 0x2, 0x7}, {0x9, 0x1f, 0x3, 0x3, 0x7, 0xfffffffc}, {0x7fff, 0x3, 0x0, 0x0, 0xc6, 0x1000}, {0x145, 0x8000, 0x1, 0x4, 0x40000, 0x2}, {0x5, 0xeab, 0x7f, 0x762, 0x10000, 0x1}, {0x3, 0x7, 0x1, 0x6, 0x6, 0x2000000}, {0x4, 0x9d1c, 0x1, 0x0, 0x7fff, 0x20}, {0x14f, 0xfffffffe, 0x1, 0x101, 0x6, 0xffffffff}, {0x80, 0xdf22, 0x1, 0x10001, 0x2, 0xd84}, {0x2, 0x0, 0x7f, 0xfa, 0x31d1, 0x1}, {0x0, 0x7713, 0x5, 0x7, 0x57757c00, 0x3}, {0x2ac9, 0x8e, 0xa46, 0x0, 0x2, 0x93}, {0x73, 0x0, 0x4, 0x4, 0x4, 0x80000001}, {0xf6f, 0x8, 0x3f, 0x4, 0xffffffff, 0x6}, {0xffffffe0, 0xfe0, 0x4, 0x200, 0xfffffffb, 0x8}, {0x0, 0x6, 0x8, 0x2, 0x20000000, 0xffff0000}, {0x3, 0x0, 0x2, 0x7, 0x5, 0x6}, {0x9, 0x80000001, 0xffff, 0x1, 0x3, 0x1}, {0x2, 0x40, 0x4c5e, 0x1, 0x7, 0xfffffffe}, {0x800, 0x5, 0x5, 0x5, 0x6, 0xbf}, {0x7, 0x5, 0x2, 0x4, 0x401, 0xb62d}, {0x200, 0xec, 0x9, 0x80000000, 0x6, 0x3ff}, {0xffffffff, 0x8ab1, 0x8, 0x3, 0x8, 0x2}, {0x1f, 0x4, 0xffffffff, 0x0, 0x6, 0x9}, {0x0, 0x0, 0xff, 0x6, 0x5, 0x3f}, {0x0, 0x4, 0x2, 0xfc66, 0x8d, 0x1ff}, {0x1, 0x0, 0x100, 0x8, 0xfffffff9, 0x8}, {0x4800, 0x0, 0x0, 0x38, 0x2, 0x7fffffff}, {0x1, 0x3ff, 0x6, 0x7ff, 0x8cb, 0x401}, {0x7, 0xffff, 0xeb, 0x2000000, 0x4, 0x8}, {0x0, 0x2, 0x20, 0x7ff, 0x7fff, 0x8}, {0xfffffffc, 0x3, 0x2, 0x8001, 0x1cd, 0x81}, {0x8, 0x1, 0x1, 0x4, 0x5, 0xd0fc}, {0x0, 0xd6bf, 0x0, 0x1000, 0x1, 0x4}, {0x9, 0x8, 0x4, 0x8, 0x80, 0xffffffff}, {0xfffffffe, 0x4, 0x7, 0x3, 0xffffff34, 0x3}, {0x2, 0x6, 0x7ff, 0x0, 0x2, 0x2}, {0x1, 0x400, 0x7fffffff, 0x3, 0x0, 0xf00}, {0x0, 0x1, 0x713, 0x1332f8d0, 0x3, 0x200}, {0x7c0e, 0x2, 0x3, 0x5, 0x8001, 0x3}, {0x7, 0x3, 0x800, 0x2, 0xfffffffa, 0x8}, {0x8, 0xffff, 0x20, 0x1, 0x1, 0xfe9b}, {0x3f, 0x5, 0x29, 0x0, 0x1, 0x7fffffff}, {0x7, 0x1000, 0x400, 0x7fff, 0x2, 0x3f}, {0x1, 0x40, 0x8, 0x2, 0x80000001, 0x13}, {0x10001, 0x8, 0x41111605, 0x3, 0x62c4, 0x1}, {0x0, 0x1f, 0x8000, 0x7, 0xfff}, {0x4, 0x300, 0x10000, 0x3, 0x5, 0x830}, {0xd8df, 0x2c6a, 0x0, 0xffffffff, 0x8, 0x9}, {0x0, 0x80000000, 0x3, 0x7, 0x80000000, 0x8}, {0x5, 0x9, 0x79, 0x280000, 0x3, 0xbd61}, {0x9, 0x673, 0x81, 0x1, 0x0, 0xfffffffc}, {0x800, 0x1, 0x8000, 0x3, 0x40, 0x1}, {0xffff, 0x9b3e, 0xc1, 0x223f, 0xff, 0x5}, {0x2, 0x255, 0x9, 0x2, 0x7, 0x8000}, {0x401, 0xff, 0xfffffffd, 0x1, 0x1}, {0x81, 0x5, 0x5, 0x2, 0x1c, 0x3f}, {0x100, 0x1d9, 0x3, 0x80, 0x100, 0x152}, {0x3ff, 0x6, 0x9e9, 0x2, 0x374, 0x4}, {0x7, 0x7, 0x3, 0x5, 0x29, 0x9}, {0x9, 0x2, 0x6, 0x3, 0x9, 0x618}, {0xed7, 0xfffffffd, 0x1, 0x230, 0xd1, 0x2}, {0xffffffff, 0x1, 0x7, 0xc6e, 0x5, 0x3}, {0x38, 0x7, 0x1ff, 0x2, 0x6, 0x1}, {0x8, 0x9, 0x401, 0x80000001, 0x8, 0x9}, {0x6, 0xbeaf, 0x6, 0x4, 0x2, 0xea}, {0x3, 0x3ff, 0xffffffff, 0x7, 0x1ff, 0x9}, {0x2, 0x1, 0x3f, 0xfb0, 0x4, 0x3ff}, {0x1, 0x5, 0x3, 0x7, 0x45f2, 0x4}, {0x67, 0x0, 0x400, 0x800000, 0x6, 0x9}, {0x7, 0x8001, 0x3f, 0x8, 0x6f43, 0x7}, {0xffffffef, 0x5, 0x6, 0xfffffff9, 0x0, 0xfffffffd}, {0x2, 0x10000, 0x1, 0x8001, 0x7, 0x1}, {0x5, 0x8000, 0x9, 0x38, 0x5, 0x100}, {0x5e, 0x8, 0xfff, 0x20000, 0x3ff, 0x8}, {0x8, 0xfffffffe, 0x8001, 0x6, 0x2, 0xffff}, {0x200, 0xe0, 0x8, 0x3, 0x6, 0x3}, {0x2, 0x4, 0x3, 0xfff, 0xffff8c06, 0x9}, {0x3f, 0x6, 0x8000, 0x4, 0x9, 0x8}, {0x6, 0xffffffb6, 0x80800000, 0x6, 0x7b}, {0x5, 0x0, 0x249, 0x1000, 0x0, 0x2}, {0x498, 0x1, 0x8, 0x2, 0x1, 0x8}, {0x65, 0x7, 0x80000000, 0x0, 0x1ff, 0x800}, {0x3, 0x1, 0x6, 0xffffff01, 0x8001, 0x1}, {0x80, 0x2, 0x8, 0x4, 0x2, 0x1}, {0x5, 0x6b8f, 0x6, 0x2, 0x9, 0x1f}, {0x3f, 0x7fff, 0x1000, 0x3, 0x9, 0x800}, {0x5, 0x400, 0x0, 0x7, 0x39, 0xffff}, {0x1, 0x100, 0x9fd5, 0xe9, 0x2de7febc, 0xffff}, {0x6, 0x7, 0x0, 0x1, 0xed, 0xbb7}, {0xff, 0xffff, 0x6, 0x1, 0x7, 0x1}, {0x2, 0x5, 0x100, 0x9, 0x40, 0x1}, {0x6, 0x200, 0x9, 0x3, 0x5, 0x2}, {0x944, 0x1, 0x8000, 0x4, 0x6, 0x3}, {0x2, 0x404, 0x5, 0xfff, 0x9, 0x7}, {0x2, 0x7442d44c, 0x9, 0x40, 0xfff}, {0x6, 0x2, 0x6, 0x5, 0x2, 0x8}, {0x9, 0x81, 0x65a3, 0x8, 0x7ff, 0x8}, {0xfffffff7, 0x95, 0x8001, 0x100, 0x3, 0x3}, {0x10001, 0x7, 0x3, 0x20, 0x7, 0x4}, {0x1, 0x400, 0x6, 0x9, 0x0, 0x800}, {0x3, 0x4, 0x81, 0x4, 0x7, 0x1}, {0x80000001, 0x3ff, 0x8, 0x1, 0xffffface, 0x2}, {0x7, 0x80000001, 0x8, 0xffff, 0x4, 0xffffffff}, {0x8, 0xfff, 0x401, 0x2, 0x4, 0x80000000}, {0x3, 0xfff, 0x3f, 0x2, 0x40, 0x2}, {0x7, 0x1000, 0x7ff, 0xfffff1d3, 0xa9, 0x7ff}, {0x9ae2, 0x7, 0x9, 0x21, 0x1ff}, {0xfff, 0x401, 0x6, 0x3, 0x0, 0x80000000}, {0x6, 0x400, 0xffffffc0, 0x8, 0x2, 0x1}, {0xfff, 0x2, 0x7f, 0x4, 0x401, 0xa2a}, {0x6, 0x101, 0x2, 0x3, 0xb02, 0x3ff}, {0x6, 0x200, 0x3, 0x9, 0x5, 0x40}, {0x7, 0x5, 0x2f0e, 0xfffff800, 0x7, 0x7}, {0xee06, 0xffffff7f, 0x0, 0xcb00, 0x1, 0x1f}, {0x4, 0x1f, 0x4, 0xffffff67, 0xfc0, 0x3ff}, {0x8, 0x6, 0x3, 0x9, 0x2, 0x40}, {0x7fffffff, 0x6, 0x80000001, 0x17, 0x4, 0x3}, {0x2, 0x4cb, 0x2, 0x6, 0x7, 0x800}, {0x9, 0x4f, 0x3f81, 0x7, 0x39e579df, 0x3}, {0x5ab, 0x80000001, 0xfffffc00, 0x5169, 0x7, 0x8}, {0x2, 0x8, 0x200, 0x3, 0x1ff, 0x7ff}], [{0x2, 0x1}, {0x3}, {0x3}, {0x5, 0x1}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x56c3285cdf479389, 0x1}, {0x3}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x2}, {0x6, 0x1}, {0x5, 0x1}, {0x1}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0xa3d9d53e51599a05}, {0x5}, {0x1}, {0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x4}, {0x3, 0x1}, {0x4}, {0x1, 0x1}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x1}, {0x2}, {0x4}, {0x4, 0x1}, {0x4, 0x1}, {0x1}, {0x2}, {0x5}, {0x0, 0x1}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {}, {0x1, 0x1}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x6c47f6703f9aefc4, 0x1}, {0x4}, {0x4}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x0, 0x1}, {0x5}, {0x3}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {}, {0x4}, {0x5, 0x1}, {0x2}, {}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x5, 0x1}, {0x2}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x4}, {0x1}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {}, {0x3}, {0x4, 0x1}, {}, {0x5, 0x2}, {}, {0x4, 0x1}, {0x4}, {0x1}, {0x1, 0x3}, {0x2}, {0x5}, {0x3, 0x1}, {0x4}, {0x4}, {0x5}]}}, @TCA_PEDIT_PARMS_EX={0xeb0, 0x4, {{{0x2b, 0x0, 0x5, 0x6, 0x7}, 0xb, 0x5, [{0x9, 0x5, 0x6, 0x1, 0x0, 0x1}, {0xa8, 0xfeb, 0x4, 0x5bd7, 0x2}, {0x532d, 0x3f, 0x9, 0x9, 0x1, 0xb80}, {0xff16, 0x8, 0x9, 0x1ff, 0x1, 0x7}, {0x9da, 0x0, 0x7, 0x8, 0x8000, 0x4}, {0x8, 0x7, 0x800, 0x3, 0x8, 0x1ff}]}, [{0x6, 0xdc22, 0x7, 0x3, 0x5, 0x2}, {0x5, 0x8, 0x10000, 0x6, 0x0, 0xffff225e}, {0x0, 0x0, 0x7, 0x2, 0x800, 0x1}, {0x3, 0x2, 0x6, 0x0, 0x9, 0xb0}, {0x8001, 0x8, 0x2, 0x2, 0x3ff, 0x4}, {0x8, 0x93f4, 0xff, 0x5, 0x800, 0xf97}, {0x43e, 0x0, 0x800, 0x7ff, 0x4, 0x1}, {0x0, 0x8, 0x7fff, 0x5, 0x168d8ba2, 0xfff}, {0x2, 0x2c02, 0x8, 0x3, 0x5, 0xff}, {0x8, 0x7df6, 0xa67c, 0x3f, 0x4, 0x7f}, {0x401, 0x1, 0x6, 0x8, 0x80000000}, {0x6, 0x1, 0x1, 0x1f, 0x3d90, 0xff}, {0x2, 0x0, 0xbbc, 0x8001, 0xf0, 0x9}, {0x4, 0x7, 0x7, 0x9, 0x7, 0x4}, {0x80, 0x2, 0x6, 0x0, 0x0, 0x81}, {0xc38, 0x6, 0x1, 0x80000000, 0x8, 0x7}, {0x80, 0x8, 0x0, 0x40, 0x0, 0x8}, {0x5, 0x2, 0x5, 0x2, 0x0, 0x9}, {0x2, 0x20, 0x8a, 0x2, 0x2, 0x40}, {0x8001, 0xe3a6, 0x7f, 0x80, 0x9b, 0x2000}, {0x2, 0x7, 0x2, 0x2, 0xbeda, 0x6}, {0x7, 0xd97f, 0x6, 0x9, 0x8, 0x6}, {0x3, 0x80000001, 0x0, 0x6, 0x4, 0x2}, {0x1, 0x9, 0xd06, 0x40, 0x1, 0x200}, {0x9, 0x9, 0x0, 0xbe4, 0x9, 0x7ff}, {0x6, 0x1, 0x80000000, 0x58, 0x101, 0x65}, {0xffff, 0x3f, 0x10000, 0x4, 0x5, 0x1}, {0xfff, 0x3f, 0xee7, 0x70e0, 0x3, 0x300}, {0xa71f, 0x9, 0x5, 0x1ff, 0x1, 0xc}, {0x401, 0x6, 0x4f0, 0x9, 0xd9, 0xfffffffa}, {0x2, 0x81, 0x2, 0xfff, 0x80000001, 0x1}, {0xb70, 0xfc16, 0x1, 0xffffffff, 0x7, 0x9}, {0xffffffff, 0x3ff, 0x80000001, 0x0, 0x2, 0x9}, {0x9, 0xe6c, 0x9, 0x8, 0x1, 0x401}, {0xfffff801, 0xcb, 0x80000001, 0x8755, 0x3f, 0x101}, {0x6f6, 0x80000001, 0x2, 0x40, 0x8001, 0x2e8eb5c1}, {0x1, 0xffffffff, 0x2, 0x8001, 0x6, 0xfffffffb}, {0x772c, 0x5, 0x7, 0x2, 0x1, 0x10}, {0x81, 0x737, 0x1, 0x9, 0x81, 0x5}, {0x7fffffff, 0xcb0, 0x5, 0x7f79, 0x3, 0x4}, {0xff, 0x2, 0x7fff, 0x9, 0x1f, 0x1ff}, {0x5, 0xff, 0x7, 0x0, 0x900, 0x8}, {0x1, 0xed84, 0x3ff, 0x6, 0x40, 0x10000}, {0x7, 0x80, 0x2, 0x6, 0x12, 0x2}, {0x9, 0x401, 0x6c11, 0x8001, 0x10, 0x80000001}, {0xfffffff7, 0x10001, 0x5, 0x4, 0x7fffffff, 0x3}, {0x0, 0x45b8, 0x7fff, 0x20, 0xfff, 0x4}, {0xee, 0x9, 0x7, 0x9, 0x0, 0x5}, {0x0, 0x800, 0x6, 0x7fff, 0x1f, 0x5}, {0x7f, 0x1f, 0x3, 0x5}, {0x8000, 0xff, 0x46bec24d, 0x8, 0x8, 0xfffffffe}, {0x88b5, 0x80000001, 0x1, 0xfffffffb, 0x9, 0x80000000}, {0x5ad, 0x7, 0x2, 0x11, 0x401, 0xff}, {0x2, 0xffff, 0x4, 0xffffff01, 0x101, 0x1}, {0x7fff, 0x7ff, 0x2, 0x7, 0x5, 0x81}, {0xe000000, 0x80000001, 0x101, 0x8, 0x2, 0xffffffff}, {0x5, 0x5, 0x10000, 0x5, 0x3, 0x961}, {0x8001, 0x6, 0x3, 0x6, 0x80000000, 0x400}, {0x1, 0x2, 0x40, 0xd6, 0x7f80000, 0x5}, {0x0, 0x2, 0x80000001, 0x2, 0x7, 0x195}, {0xd96, 0xf16, 0x2, 0xb04, 0x8000}, {0x81, 0x0, 0x9a5, 0x81, 0x4, 0x8}, {0xddd, 0x6, 0x13, 0x101, 0x100, 0x3}, {0x816, 0xffff, 0x9, 0x6, 0x80000001, 0xffff0001}, {0x0, 0x3, 0xdb, 0x2e, 0x7, 0x9c0f}, {0x2, 0x80000001, 0x8, 0x9, 0x2, 0x6}, {0x600000, 0x9, 0x1, 0x5, 0x7, 0x3f}, {0x1, 0x4, 0xfffffffb, 0xfffffff7, 0x101, 0x8435}, {0x1, 0x0, 0xb4b1, 0x400, 0x5, 0x6}, {0x3, 0x5, 0x1, 0x3, 0x0, 0x1}, {0x1, 0x2f21, 0x5, 0x8, 0x80000001, 0x2}, {0xb831, 0x4, 0x8, 0xfbde, 0x9, 0xff}, {0xff, 0x6, 0x9, 0x5, 0x9, 0x6}, {0x6, 0x9, 0x1000, 0x1, 0x200, 0x7fffffff}, {0x5, 0x1996, 0x8, 0x3, 0x9, 0x7}, {0x8, 0xfffffffd, 0x81, 0x20, 0x5, 0x8}, {0x9, 0x3, 0x4, 0x5818, 0xfffffffa, 0x9}, {0x5df, 0x5, 0x2419, 0x91d8, 0x9, 0x1}, {0x8, 0xae2, 0x7, 0x0, 0x9, 0x9}, {0x7fffffff, 0x3, 0x0, 0x6, 0x80, 0xfe}, {0x9, 0x5, 0x0, 0x9, 0xffff, 0x9}, {0x1f, 0x5, 0xc20, 0x6ba8, 0x8, 0xfffffffd}, {0xf4, 0x0, 0x9a6a, 0x0, 0x2c, 0xcc88}, {0x401, 0x0, 0x4, 0x1, 0x81, 0x95}, {0x0, 0x19d, 0x10001, 0xffffffe0, 0x7fffffff, 0x3}, {0x9, 0x1f, 0x0, 0x0, 0x0, 0xfc44}, {0x2, 0x8, 0x8001, 0xd5, 0xff}, {0x2, 0x2, 0x40, 0x1ff, 0x4, 0x8}, {0xfffffff9, 0xfffffe01, 0xfff, 0x5, 0x200, 0x9}, {0x80000001, 0x8, 0xf8, 0x8, 0x5c, 0x20}, {0x80000001, 0x7ff, 0x1, 0xfff, 0x8, 0x3}, {0x1000, 0x1, 0x4, 0x1, 0x6, 0x6}, {0x100, 0x9, 0x1000, 0x5, 0x0, 0x3}, {0x480, 0x4, 0x6, 0x100, 0x1, 0x20}, {0x32, 0xffffffe1, 0xa2, 0x9, 0x9, 0x8}, {0x0, 0x7f, 0x6, 0x9, 0x9, 0x80}, {0x3, 0x1000, 0x7, 0x1000, 0x9, 0xfffffff7}, {0x6, 0x40, 0x4, 0xee, 0x65, 0xed0}, {0x2, 0x80000001, 0x81, 0x9, 0xbb, 0x7}, {0x4, 0x3, 0x4, 0x8, 0x80000001, 0x3}, {0x2, 0x7fff, 0xffff, 0x1, 0x8, 0x6}, {0x7fffffff, 0xed, 0xfffffffb, 0xffff, 0x0, 0x3}, {0x1, 0x5, 0x86b8, 0x8800, 0x1f, 0x3}, {0x4, 0x10000, 0x2, 0x1, 0xcb4, 0xca81}, {0x2, 0x8, 0xffffffff, 0xffffffff, 0x7, 0xfff}, {0x81, 0xb39973b, 0x3, 0xffffff73, 0x80000000, 0x9}, {0x1d7db920, 0x7f, 0xfffffff7, 0x7fffffff, 0xa2f, 0x86b}, {0x80000001, 0xc03, 0x8, 0x1, 0xffffffff, 0x5}, {0x3, 0x5, 0x2, 0x3, 0x2, 0x95}, {0xffff4247, 0x81, 0x0, 0x1, 0x40, 0x97}, {0x7fffffff, 0x8000, 0x7, 0x2, 0x4, 0x4}, {0x5, 0x8, 0x0, 0x101, 0x1000000, 0x9}, {0x3, 0xfffffbff, 0x4, 0x9, 0xfffffffb, 0x8}, {0x6e5e, 0x176, 0x6, 0x6, 0x8001, 0x7}, {0x2, 0x126, 0x6, 0x101, 0x80000000, 0x10001}, {0x6, 0x7f, 0x6564, 0x640, 0x9, 0x7f}, {0x51a7, 0x6, 0x8000, 0x7fff, 0x80000000, 0x3}, {0x1ff, 0x4, 0x0, 0x3, 0x1, 0x4}, {0xe48, 0x3, 0x0, 0xfc, 0x0, 0xfffffff9}, {0x6, 0x800, 0x6, 0xba, 0x5, 0xd4a}, {0x81, 0xffff8000, 0x7, 0x4, 0x1f, 0xfffff5ad}, {0x10000000, 0x31ad66a, 0x7, 0x80, 0x5, 0x80000000}, {0x3, 0x1f, 0x0, 0x7, 0xff}, {0x81e, 0x9, 0x5, 0x80000000, 0x9, 0x80000001}, {0x3, 0xffffff7f, 0xfffffffc, 0x6, 0x1f, 0x3}, {0x1, 0x8000, 0x3, 0x367, 0x7, 0xfffff801}, {0x2, 0x1, 0xa4, 0x2, 0x6e90cd0c, 0x8}, {0x4, 0x7fe, 0xee6, 0x9, 0x6, 0x80000001}], [{0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {0x1}, {0x0, 0x1}, {0x2}, {0x5}, {0x3}, {0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0xd}, {0x1}, {0x4}, {0x3}, {}, {}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {}, {}, {0x74f231ffcab2004f}, {0x4}, {0x3, 0x1}, {0x2}, {}, {0x3}, {0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x4}, {0x2}, {0x1}, {0x5, 0x1}, {0x2}, {0x3}, {}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x1}, {0x4}, {0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0xb, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x5}, {0x6}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {}, {0x3}, {0x3}, {0x2}, {}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x1}, {0x1}, {0x4, 0x1}, {}, {0x2, 0x1}, {0x3}, {0x1}, {}, {0x0, 0x1}, {0x3, 0x1}, {0x5}, {0x4}, {0x4}, {0x3}, {}, {0x5}, {0x5}, {0x5, 0x1}, {0x2}, {0x5, 0x1}]}}, @TCA_PEDIT_PARMS_EX={0xe98, 0x4, {{{0x4, 0x1, 0x4, 0x5, 0x131}, 0x9, 0xf7, [{0x5d17, 0xfffffffa, 0x40, 0x8, 0x40, 0x3}, {0x5, 0x2, 0x0, 0x4, 0x6, 0x7}, {0x0, 0xadfe, 0xeae, 0x0, 0x7, 0x4dfc8b55}, {0x10000, 0x7ff, 0x9, 0xfff, 0x0, 0x3}, {0x5, 0x3, 0x3, 0x8, 0x100, 0x4}]}, [{0x3, 0xc68, 0xc, 0x8001, 0x0, 0xff}, {0x7, 0x9, 0x1, 0x9, 0x80, 0x800}, {0x26, 0x20, 0x530, 0xbb5, 0x6, 0x2}, {0x5, 0xfffffffc, 0x6, 0x700, 0xff, 0x3}, {0x0, 0x2000000, 0x7, 0xfff, 0x1, 0x35}, {0xffffffff, 0x3d8, 0x0, 0x9, 0xffff8001, 0x4}, {0x1, 0x7fff, 0x6, 0x5, 0x3f, 0x40}, {0x0, 0x3, 0x7, 0xfffffff7, 0x1, 0x1f}, {0xfffffb45, 0x2, 0xfff, 0x8000, 0x9, 0x7}, {0xfe0000, 0xcc, 0x3, 0x2, 0x10001, 0x400}, {0xffffff86, 0x0, 0x10001, 0xfffffff9, 0xffffff46, 0x4}, {0x4, 0x6, 0x800, 0xffffffff, 0x1, 0x4}, {0x42f, 0x400, 0x44, 0x7d41, 0xe2a4, 0x6}, {0x7fff, 0x99, 0x5, 0x1f8, 0x2}, {0x6, 0xfff, 0x9, 0x7fff, 0x80, 0xfffff000}, {0x1, 0x2926, 0x80000001, 0x192f, 0x4, 0xfffff800}, {0x2, 0x7fffffff, 0x400, 0x4, 0x0, 0x8}, {0x76, 0x40, 0x6, 0xc80, 0x1000, 0x3702737c}, {0x0, 0x1f, 0x0, 0x5, 0x80000001, 0x2598ca46}, {0x8001, 0x2, 0x7ff, 0xffff, 0xffff}, {0x20000, 0x5, 0x464, 0x8, 0x1, 0x5}, {0x7, 0x6, 0x400, 0xffff50b7, 0xff, 0x74378901}, {0x6ba, 0x2, 0x2, 0x0, 0x44, 0x1}, {0x4, 0x3f00, 0x4, 0x800, 0xfffffe01, 0x61}, {0x0, 0xffffffff, 0x80, 0x4, 0x8, 0xffffffff}, {0x9, 0x2, 0x3, 0x10000, 0x7, 0x200}, {0x8, 0x5, 0xffffff6b, 0x3, 0x2, 0x6}, {0x7f, 0x6, 0x6, 0xff, 0x7f, 0x7}, {0x3ff, 0x7, 0x7, 0x9, 0x80000001, 0xffffd9d3}, {0x4, 0x3, 0x3, 0x4, 0x80000001, 0x6}, {0x33afe8fc, 0x7cc, 0x142, 0x4, 0x4, 0x68}, {0x7f, 0x9, 0xc057, 0x1, 0x1000, 0x7}, {0x80000001, 0x6, 0xbf, 0x6, 0x8b8, 0xd8e}, {0x5, 0x6, 0x81, 0x9, 0x1, 0x10000}, {0x4, 0x1f, 0x1, 0x6, 0x7, 0xffff4df1}, {0x4, 0xfc04, 0x80000000, 0x8000, 0x9}, {0xc92, 0x8, 0xffffff96, 0x7, 0x8001, 0x56}, {0x3, 0x4, 0x2, 0x5, 0x6, 0x80}, {0x7f, 0x7fffffff, 0x8, 0xfffffffa, 0xfffffffa, 0xfff}, {0x2, 0x7, 0x8, 0x9, 0x8001, 0x2}, {0x7, 0x8000, 0x8001, 0x4, 0x1, 0x8}, {0x1, 0xffffff0b, 0x33, 0x3b8, 0x100, 0x7f}, {0x1, 0x8, 0x2, 0x3, 0x1, 0x3}, {0x47a69d5e, 0x80, 0x20c, 0x8, 0x5, 0x3}, {0x7, 0x4c, 0x7ebc, 0x6, 0xfff, 0xa00000}, {0x2, 0x1, 0xba4c, 0x5604, 0x8000, 0x8}, {0xdf5, 0x1, 0x66ae, 0x4b399e64, 0x7f, 0x9}, {0x0, 0xd, 0x1, 0xfffffff7, 0x47f9, 0x2}, {0x2, 0x5, 0x7, 0x5f, 0x3b, 0x80000001}, {0xffffff12, 0x9, 0x9, 0x4, 0x13, 0x20}, {0xfff, 0x13f6, 0x9, 0x419, 0x1, 0x101}, {0x1c, 0x1ff, 0x7ff, 0x55fd, 0x2, 0x495}, {0xec, 0xffff0000, 0x101, 0x53f, 0x8}, {0x401, 0x7f09, 0x2, 0x8, 0x8000, 0x3}, {0x6fbce8e0, 0x5, 0x9f57, 0x1, 0x7, 0x6}, {0xf42, 0xffff, 0x7, 0x8, 0x5, 0x4}, {0x80, 0x401, 0x9, 0x10000, 0x6, 0x1f}, {0x6, 0x3, 0x0, 0x80, 0x10001, 0x6}, {0x8, 0x9, 0x3fe, 0x0, 0x800, 0x9}, {0x637, 0x607a, 0x20, 0x9, 0x5ea, 0x1}, {0x4, 0x6, 0x3, 0xffffffc0, 0x20, 0x4}, {0x0, 0x6, 0x0, 0x6, 0x8, 0x5}, {0xffffff01, 0x1ff, 0x6, 0x4, 0x1000, 0x9}, {0x1f, 0x2, 0x2, 0xffffffe0, 0x7, 0xffff8000}, {0x1, 0xe5c4, 0x5, 0xfffffffd, 0x8, 0x8}, {0x1, 0x3, 0x0, 0x762, 0x200, 0x9}, {0x0, 0x3, 0x1, 0x0, 0x2, 0x81}, {0x1669, 0x1, 0x3, 0x4, 0xf5, 0x3}, {0xfffffffb, 0x3, 0x5, 0xa9d2, 0x0, 0xb703}, {0x8, 0xe308, 0x10000, 0x52b, 0x7, 0x8}, {0x886, 0x5, 0x5, 0x7, 0x5, 0x3f}, {0x7fffffff, 0x2, 0x3f, 0x8, 0x80, 0x4}, {0x8fc, 0x400, 0x8, 0x4, 0x80000001, 0x7}, {0x7fff, 0x9, 0x1, 0x7, 0x1000, 0x8001}, {0xfffffff8, 0xc, 0x8000, 0x40, 0x6, 0x4}, {0x0, 0x2, 0x2, 0x6, 0x0, 0x1}, {0x29, 0x81, 0x9, 0x6, 0x70, 0x9}, {0x323b, 0x9, 0xce5c, 0x81, 0x3c8, 0x20}, {0x3, 0x0, 0x2, 0x0, 0x9, 0x7ff}, {0x0, 0x6, 0x101, 0xfffffffa, 0x4f2848e0, 0x131}, {0x3529e2ee, 0x4, 0xfffffffa, 0xfffffb66, 0x6, 0xd8ba}, {0x53fd, 0x30, 0x5, 0x6, 0x4, 0x7}, {0x9, 0xfffffc01, 0x3, 0x1d44, 0x2, 0x6}, {0x1ff, 0x8, 0x8, 0x6, 0xdbba, 0x10001}, {0x2, 0x8000, 0x80, 0x9, 0x7fff, 0x10000}, {0x5, 0x376, 0x4, 0xfff, 0x8, 0xc31}, {0x9, 0x7ff, 0x6, 0x4, 0x9, 0x5}, {0x4, 0xc8e, 0x7, 0x7f, 0x5, 0x1}, {0xfff, 0x2, 0x7, 0x101, 0x7ff, 0x4}, {0xfffffc01, 0x3, 0x1, 0x6, 0x2, 0xd801}, {0x6, 0x5, 0x9, 0x7fe000, 0x1, 0x2}, {0x4, 0x8000, 0x4b, 0x6, 0x6, 0x8}, {0xf6c5, 0x0, 0x2, 0xf3e, 0x101, 0xb8}, {0x3, 0xf495330, 0x6, 0x676, 0x4, 0x4}, {0x9, 0x1, 0x9, 0x4d, 0x7, 0x8}, {0x1, 0x3, 0x2, 0x8, 0xf2f35753, 0xf1e6}, {0x4, 0x8, 0x0, 0x4, 0x0, 0x81}, {0x9, 0x3, 0xfffff000, 0x40, 0x200, 0x3}, {0x0, 0x0, 0x7ff, 0x8, 0xffff, 0x3}, {0x80000000, 0xff, 0x8, 0xa2, 0x40000000, 0x335}, {0x4, 0x1, 0x6, 0x1000, 0xfffff485}, {0x463d, 0x7, 0x8, 0x1, 0x901, 0x7fffffff}, {0x9, 0x6e3f, 0x2, 0x4, 0x0, 0x7fffffff}, {0x6, 0x10000, 0x381e792e, 0x10001, 0x2, 0x416d}, {0xfaa8, 0x5124, 0x5, 0x800, 0x0, 0x80000001}, {0x81, 0x0, 0x5, 0x3, 0x200000}, {0x1, 0x60, 0xffffffff, 0x40f3, 0x3, 0x1e4}, {0x5, 0x0, 0x3, 0x7fff, 0xfff, 0x80000000}, {0x7, 0xffffffff, 0x3235, 0x4, 0xffff5395, 0xea}, {0xfffffff8, 0x4, 0x20563836, 0x1, 0x6, 0x1}, {0x86, 0xaa, 0x9, 0x9c9, 0x7, 0x6}, {0x9, 0x452, 0xfffffffd, 0x7fff, 0x8, 0x4}, {0x6, 0x80, 0x5, 0x1, 0x8, 0x7}, {0x285b, 0x10001, 0x7fffffff, 0xfffffffc, 0x6, 0x5}, {0x7fff, 0x1ff, 0x7, 0x1, 0x8001, 0x88f}, {0x7fff, 0x5, 0x8, 0x9, 0x1, 0x4}, {0x128dc0, 0x80000000, 0x7f, 0x7ff, 0x5, 0x8}, {0x3, 0xffff, 0x20, 0x5, 0x1, 0x3e75}, {0x5, 0x6, 0x7b2, 0x3, 0x80, 0x1ff}, {0x0, 0x8, 0x7, 0x1, 0x1, 0x9}, {0x7, 0x4, 0x2, 0x2, 0x3, 0x10000}, {0x7492, 0x101, 0x6, 0x20, 0xa1, 0x80}, {0xc8bf, 0x5, 0x4, 0x7, 0x81, 0x5}, {0x1f, 0x4, 0x10001, 0x8, 0x3, 0xffffffff}, {0x44ad, 0x2, 0x6, 0x8001, 0x9, 0x30}, {0x7f, 0xbdf7, 0x8001, 0x7, 0x3, 0x21e5}, {0x4, 0x72, 0xd2b, 0x3, 0x5, 0x4f7}, {0xfffffffd, 0x80, 0x6, 0x9, 0x6, 0x8}], [{0x4, 0x1}, {0x1}, {}, {0x4}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x4}, {0x4}, {0x4}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x5, 0x1}, {0x4, 0x1}, {}, {}, {0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1464d8419e9ef363}, {0x0, 0x1}, {0x5, 0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x1}, {0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0xe, 0x1}, {0x4}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {0x5}, {0x4, 0x1}, {}, {0x4, 0x1}, {0x1}, {0x4, 0x1}, {0x6, 0x1}, {0x1}, {0x3}, {0x2}, {0x2}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x5}, {0x1, 0x1}, {0x2, 0x1}, {0x2}, {0x5, 0x1}, {0x5}, {0x1}, {0x4, 0x1}, {0x6}, {0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x1}, {0x3}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0xc7dbbd03bb751335}, {0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x2}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {}, {0x4}, {0x0, 0x1}, {0x7}, {0x2}, {0x2, 0x1}, {}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x1}]}}]}, {0x62, 0x6, "65d47338febd8b80cb03d8ff80130641ad6cead14a45c61147a48af853018d55e531f942df9750b856e0a53c0eb524a49859baca700cf331752fe62caef3e7a778e94cc9068f7fa43f8923b25b23be51c903e1779484bc627ea475c07d7d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_police={0x588, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x4a0, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0xffff, 0x20000000, 0x100, 0x8, 0x4, {0x6, 0x1, 0x4, 0x8001, 0x6, 0x372}, {0x20, 0x0, 0x6, 0xd55e, 0x7, 0x4}, 0x1, 0x80000000, 0x80000001}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x800, 0x1, 0x0, 0x3, 0x401, 0x5, 0xfffffffa, 0xfffffffb, 0x6, 0x7, 0x1, 0x7238, 0x10001, 0x4, 0x3, 0x2, 0x7, 0x8, 0x7fff, 0x800, 0x7, 0x9, 0x9, 0x0, 0xcf, 0x9, 0x7fff, 0x4, 0x9, 0x2, 0x5, 0x0, 0x1d26, 0x4, 0x1, 0x7, 0x2, 0x7fff, 0x7, 0x5, 0x1, 0x81, 0x1, 0x10001, 0x400, 0x80000001, 0xec38, 0xffff, 0x0, 0x2, 0x3ff, 0x7, 0x2b, 0x4, 0x1000, 0xfffff801, 0x5, 0x2, 0x1, 0x0, 0x5dd087b3, 0x6, 0x9, 0x7fff, 0x4a, 0x7, 0x7ff, 0x8, 0x9, 0x7fff, 0x7fff, 0xce1, 0x7fff, 0x4fd, 0x0, 0x1, 0x1000, 0x7fffffff, 0x7, 0x200, 0x7f, 0x7f, 0x0, 0xf72, 0x10001, 0x7, 0x2, 0x8000, 0x6, 0x4, 0x2, 0x8000, 0xffffffff, 0x7, 0x5, 0x401, 0x2, 0x2, 0xb0fe, 0x3, 0x4, 0x456, 0x2, 0x74c, 0xec9e, 0x2, 0x2, 0xfa, 0x5, 0x2, 0x2cb1, 0xfee, 0xffffffc0, 0x1, 0x66, 0x8, 0x9, 0x8, 0x1, 0x81, 0x100, 0xa10c, 0xfffffff8, 0x2, 0x1, 0x101, 0x5, 0x2, 0x9da0, 0x3, 0x2, 0x0, 0x200, 0x3, 0x7, 0x6, 0x5, 0x9, 0x7, 0x9, 0x3f, 0x3f, 0x3ff, 0xffff, 0x1, 0x6, 0x1, 0x2, 0x8001, 0x7, 0x8, 0x81, 0x3, 0xffff, 0x1000, 0x1, 0x7, 0x8, 0x4, 0x2, 0x7fff, 0x8, 0x400, 0x2, 0x1, 0x5, 0x20, 0x4, 0x1ff, 0x2, 0x9, 0x1, 0xa6, 0x5818, 0x2, 0x1000, 0x8, 0x5, 0x40, 0x4, 0xf50c285, 0x24, 0x4, 0x3, 0xccc, 0x80, 0xd20, 0x3, 0x3d, 0x8, 0x4834, 0x1ff, 0xffff, 0x1, 0x2, 0x0, 0x5, 0x5, 0xfffffff8, 0x4, 0x6, 0x1c0000, 0x6, 0x2, 0xd13, 0x61e3, 0x2, 0x9be1, 0x0, 0x81, 0xfffffffe, 0x1, 0xb7, 0x3f, 0x3, 0x58, 0xfffffffc, 0x7f, 0xd521, 0x80, 0x1402, 0x20000000, 0xfc, 0x100c000, 0x0, 0x7fff, 0x1, 0x0, 0x3, 0x4, 0xc81a, 0x200, 0x10000, 0x6, 0x3, 0x1ded4000, 0x223, 0x3f, 0x7f, 0x2, 0x1f, 0x8, 0xffffffff, 0x4, 0x3, 0x3, 0x2, 0x8, 0x707, 0x2, 0x5, 0x0, 0x3, 0x2, 0xe2]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1ba}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffff, 0x20000000, 0x0, 0x1ff, 0x1, {0x8, 0x2, 0x9, 0xdd, 0x7ff, 0x101}, {0x3, 0x0, 0x800, 0x1, 0x0, 0x98a}, 0x0, 0x0, 0x800}}], [@TCA_POLICE_RESULT={0x8, 0x5, 0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8078}]]}, {0xbd, 0x6, "e22ba0c7c927911fa16f51e27f68b27669aef160cb5ae50c59326d33279afce46ae2ff97eed0074782d4f72d49d91b43e0d22d8d29afba47cbec90921fcfcc2da78a3eba7a3d73c452a0313b69bfc9559f5ace6ccafb990c17841e0673c8e3cd416e425123c6c8de12db293fb50111d478cca63a10843bc96083fac80fffd236e91b38534c864cd8eec825c6cb39d6a05d8e60adc5ea95bbb0382c0eacd2902ee713a531cc5657175528aed3f64546358d6f4edff80c7bd25f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_vlan={0x90, 0xc, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x7e3}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x2}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x5}]}, {0x3b, 0x6, "f328e0f43dec27e3ee2e93f9296f2bac40e34a74f21cbe28715cd1fea9fc5c0eb7f38898490891bc02eb73c54e863fe0d4d4d81a6c6d1f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}]}]}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x1828, 0x2, [@TCA_BASIC_ACT={0x1364, 0x3, [@m_csum={0x14c, 0xd, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x0, 0x2, 0x7, 0x7ff}, 0x3d}}]}, {0x101, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_police={0x1030, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x4}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0xd8, 0x1d, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x1, 0x131d, 0x5}}, @TCA_GACT_PARMS={0x18, 0x2, {0x43, 0xffffffff, 0x7, 0x10001, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1f30, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xdd1, 0x6}}]}, {0x6d, 0x6, "987b8089295385010633ca953eecd0cc6a285099a087a603964121b94795ed69f4e243e5abf8e3f3f85cb0733e0ce1bec10af29214edaa962c9e9fab4ae2a65d756d6098eb0314433ec65f311d92c95b4c1a3bc5096fb48dfa2aecca16546d73633c20ee39fcc8b204"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_simple={0x10c, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x7, 0x1, 0x1f, 0x82}}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x5, 0x9, 0x6, 0x5, 0xfffffffb}}, @TCA_DEF_DATA={0xd, 0x3, 'loginuid\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x2, 0x20, 0x5, 0x9c, 0x1}}, @TCA_DEF_DATA={0x9, 0x3, '}[./\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x7, 0x1ff, 0x0, 0x5e, 0x5}}]}, {0x54, 0x6, "b248d156e0e0d3eca65325befbdddbb5c714a50053be9115a7d419b02eb04092a9f90226720796bda18d27edf8ff2ff93c28ec56c3de14c8b1975d0a0671c8becb6b203943a74c6a5aef10d9ceea86ea"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0xffe0}}, @TCA_BASIC_EMATCHES={0xd0, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xb4, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x5, 0x3, 0x8}, {0x3, 0x6, 0x0, 0x800}}}, @TCF_EM_CONTAINER={0x30, 0x3, 0x0, 0x0, {{0x7fff, 0x0, 0xab89}, "307eae3435cf0e2c44a1a3b8dacd53f069e928576e514c0741025fc881e6dddc149a"}}, @TCF_EM_IPT={0x1c, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x3}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}]}}, @TCF_EM_CONTAINER={0x48, 0x3, 0x0, 0x0, {{0xac, 0x0, 0x1ff}, "712e38211750417d01362d06bd2a4294ab7ff00130fd91ac745f00ec2568cf3011404c9dd5bcd2b2de7f47de405fdbba928b9a6e2579f3d02488"}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x800}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x10}}, @TCA_EMATCH_TREE_HDR={0x8}]}, @TCA_BASIC_EMATCHES={0x3e8, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x9c, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x68, 0x1, 0x0, 0x0, {{0x2, 0x0, 0x2088}, "1fdcdbe4bf499d40b72cc79bda8b319196ec912225b2ec2348d0cf239ef99df38f7c5ee6208cd82be13a6c348631ba8c7cdcc6a2eb477ff4bbee9f7fb9b40ac47365420500108adfed31820da26a503f53e4f43286d2c9bab0"}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x1, 0x7, 0x7}, {{0x3, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x1, 0x1}}}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0xc7, 0x3, 0x96}, {0x7, 0x0, 0xffffffff, 0x7}}}]}, @TCA_EMATCH_TREE_LIST={0x24, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0x3, 0x8, 0x48}, {0x4, 0x3, 0x4}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x52, 0x8, 0x1}, {0x0, 0x5, 0x7}}}]}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_META={0x14, 0x3, 0x0, 0x0, {{0x1, 0x4, 0x8}, [@TCA_EM_META_RVALUE={0x5, 0x3, [@TCF_META_TYPE_VAR='|']}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x0, 0x1, 0x3}, {0x4a, 0x8, 0x3, 0x1, 0x7}}}]}, @TCA_EMATCH_TREE_LIST={0x2ec, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x190, 0x2, 0x0, 0x0, {{0x2, 0x9, 0x6}, [@TCA_EM_IPT_MATCH_DATA={0xe6, 0x5, "70e5c783513c8198bb5206a34c000796394c2b73b283784432af2a10bcf76a8ea69baa3565277f55ab8d4c88abba075fa974bc8cfea66447f35b74beecb4f06e46bf1c24dffb667745071b2a0808df8cf825542405f0c960174a3e5873448325a73439430e8f756ef67cb61e3700f56b88a185cd13f9ac7b31602b7fe192fe66a5ab66cc32faa33422f6d5616cd5bbf04c0bcb717cf7f3e183b71ea8fbb49ac8e966fe64d560080a62f2be8b1816518b1d58a9b83278f296682969105fd6d2ffb7bacb544ec17c7fb955e118833d4b371adaeed162b86a06a0bdfef234b5d49dfd7d"}, @TCA_EM_IPT_NFPROTO={0x5}, @TCA_EM_IPT_MATCH_DATA={0x68, 0x5, "16e63c62f430b420d9559418d5ed63e70d71270a663afbdcc2684a808d8c3bd56d50d3f9055fdeebe9fba5ea977e86d95ff3fc3fe8f00124b399ab78a8b70b614e41cee80358d81c096c2ea1f8b98a3f46a021d26f15a78388708fbe19e5fc7dc878c350"}, @TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}]}}, @TCF_EM_CONTAINER={0x78, 0x3, 0x0, 0x0, {{0x5}, "36de0b1beb8625d797f178b41fbf5cb10c50fa6bf95e0e08f2d56e37ea8cb14f112b44904898e225c1940457b1538db2c44d96e692fbcbd37a09ca9c330beaf1cb15c64c03b2bfea7782e336731627f58bf16ccfe02d2593f85dec95ec7c0df46888974929796ea630ba48a1"}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x2981, 0x8, 0x9d2}, {0x1, 0x2, 0x4}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0xffff, 0x3, 0x7}, {0x1ff, 0x1ff, 0x400, 0x8000}}}, @TCF_EM_META={0x38, 0x3, 0x0, 0x0, {{0x4, 0x4, 0x401}, [@TCA_EM_META_LVALUE={0x20, 0x2, [@TCF_META_TYPE_INT, @TCF_META_TYPE_VAR="40d49bb8a6cf42699d", @TCF_META_TYPE_INT=0x6, @TCF_META_TYPE_VAR="96e0cc", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x1]}, @TCA_EM_META_RVALUE={0xc, 0x3, [@TCF_META_TYPE_VAR="be255330", @TCF_META_TYPE_INT=0x2]}]}}, @TCF_EM_IPT={0x2c, 0x1, 0x0, 0x0, {{0x3, 0x9, 0x1}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xc}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xc}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}, @TCF_EM_IPT={0x18, 0x1, 0x0, 0x0, {{0x6, 0x9, 0x100}, [@TCA_EM_IPT_MATCH_NAME={0xb, 0x2, 'policy\x00'}]}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0xffff, 0x7, 0x8}, {{0x4, 0x0, 0x0, 0x1}, {0x0, 0x1}}}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0xffff, 0x7, 0x5483}, {{0x3, 0x1}, {0x1, 0x0, 0x1, 0x1}}}}, @TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x3, 0x8, 0x279d}, {0xffffffffffffffff, 0x4, 0x2}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfff}}]}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x80}}, @filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x467c, 0x2, [@TCA_BASIC_ACT={0x1148, 0x3, [@m_xt={0x1144, 0x12, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x105c, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_TARG={0x102a, 0x6, {0x2, 'security\x00', 0x5, 0x7f, "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"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}]}, {0xc2, 0x6, "b9b7a85d1d5006f20a4c292cd6cce5f1ec997f21cd6dc2cfd79bb973183d929764218e96308455970b38d0e5e25466d22f0ed531fd7746b9cb0c0a26798f623cdc6826dd15774b16fc2eb255b6374e44c79ac978ab5c4fe5408ce5bf9f3bce6cba16a15d251eed1d56000e104fdaa09e6e9152b86e37ab8f7fb172d6aee42aa4278cbc79ed39c80fd1acef5122ef1403aacc9fc86b51a71dffd3a8b580133a674abeff1b6d9b837d6a181239ab1c04e3c504a6b025eec59f14219dc53e17"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x4}}}}]}, @TCA_BASIC_EMATCHES={0x3304, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x2114, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x10bc, 0x1, 0x0, 0x0, {{0x6, 0x9, 0x9}, [@TCA_EM_IPT_MATCH_DATA={0xa1, 0x5, "b409e413686402d3c2a165839b3f38bbbeb5617fffdf5e8c2e01f113c45a5a7eacb01ed6902e27453eb02684172b92ac5cb24994cf87b75bae5ecd4558287b4ab34ed8e5038690153b0582cfa88c7d0c853d944b757148a011a27e027c541c44ca1ca912921edc9f206c209adabd224ec58616895f367d348c0817c8fdc5c69b88203e476e3c0b52ab3b9d10b9d2b9623a12da5e175413259ed762bd32"}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9e}, @TCA_EM_IPT_MATCH_DATA={0x1004, 0x5, "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"}]}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x800}, {0x0, 0xbd, 0x6, 0x7c27c887}}}, @TCF_EM_CONTAINER={0x100c, 0x2, 0x0, 0x0, {{0x40, 0x0, 0x401}, "6aabb01e49f1ef87ce21233c9f4e1417d927f5078789cf641ca54a361e5d8f9386de50013666bb082ef4e25b24db4603b7ab28da1eb5340388c74e565edd17f6255974abcbf39e8582e85dffa75feef481123b66db63dfb61d70d6b98e908a5cab82f0fbe667c48ea1019bb2c1e56b4dcb38b1c5c8f8a50dfbf2e0cdcf5f6ff6c7b5e75a961a56aa63eb3a333e7ce843b9261c901d113aef54239f8c079696d3c199ff6104c0947b4821ae58d4fea6316d4f67de4a263db980fd3c5ab9d414b78510b5dd9bf75525ced0e2532ef8d42848ef0f966c29c4b73be8c2e41c258c5ff1c07d230b0fea58f0e93ec05943b16d08e745f6856d1890ee4d3f6aed5a0e81dd706d7792ef3ae88221613d3f284f58cc79376047350965169b8df04304f6608eea65bed521f89c804c0e6b6043e70e513d5fe22acc72fbeaf70c17fddf4c5e95955ddd1e7aebbf4102b7f64ae1263e08776ff49820731cdaf98c8156a090ce86af22055f5264644fd8fb3af977c225662f9f1ccc5be4c8d004d3ab860019c6fddfdc73837eb218661b6882a58df21353d95afa3b22c1f1b84a146157448e5370522b355001e13a56fa044123fbc457def43e818ff61fda16f290c50c59eb75fac8c8206ab75f85ec0004d0983b5164edfb6af88c0bd9a6fe4b4d8ebc9c08e6e57da86d1446fc6da36e1ff5e457c70e0b56091d94bc4f3ddc5a7f4f7a9ae0228ec41cebfd5cc35242f67155d341d953e5a8d5cf6f64bf97769bbfb178d4cb63d505fc5fd536d85f989b8f55366eb7d46abfd431ec03fc91f7880263e654a4cfa59f95907d7ed1713f97a8e8d36e965379368e31048910f49113ef236ab0fb90e9b896b8e687a8423dfe352bcf6bb869f67bb7a98e2fb6800a990e1a97890a4903b631d583876313bdb35ff786cd03d17125b9fb29b8813be0b571c760bd83176dc78526eedaa743d91549bbc146381066abb9069930b7feaa2cb493d1ad5770daceef25e95484c0dcb2a552aa77a6b6adab8d911810c55b78cdcdd42f08311919d4560013e3b53c91397f8b0aa5e0c10d020dc67e4e36519042fa268c7a2a89a70ab70edd2938975e8bb2544e20cc4e72f6a267113a1644507e502a29e8f95f639a8571c7c4898d6759eeeda94dfd1352e49c698899ed13485b7fab7bc3cda894e7e3df41d65ced7a35485ca697c1adb6eb951afe950fc0be7e029543e1f074c3e6ae20203e729315f2512f4bba09c7092119ddedf0edbeddcbef7930c6cc46545c3a8ccb87cb37cd19056f5d7e975c8662995ba2f5834e0bc9ca5dd7d32b9966ce02d7751477c23e97acbca986fb8c8fdcbc1d4762f6823d6597a05c5214bfbf88b01859fe9507d6a667ae0a94d2be9f79eabc80cd1c55c4b05d2c52c43da4968a1e110fcb292c76e0507361211b84f374ce9123d4d46e87a59bd7cf98f9501439375ec760888c4c95841d2151d2097de68c4604fd044f89ee51bead3996c6163b170d1e71c00345554ee9667b4ce65bcd92127ca06a88d9b4e7ab8ab134e291fb52b0af850791816751640242d1d8fe9e05779c90133847fa85c3f687ba5071d3d69377c2e851b62fd3d6d61d34d51c99b61d85e0d6e82ed4a3ca03171ddfcd0680ee14c64f865a6c2126e7e79b3606298e2690c718c3bfd07cebc4014e3cfb1cf317d97366c3e6b3b29ecb6e26a4d0f5000761850808d62eba166ca417e5442595a2a4efa434807291670b14bc0b3a77313f47107ea0a1e5c0ff3715ded675d04f6d44e4e1da0824a8e4f95595afca4f8548c9900709e1e8a8b030e539884c789abc6bca18ae84d0615d1d08a95ffccd40d18f7f5e33b9002856cb79c1acd76d0b759a88bee0012e40fb3654f04471a4cc2f1de3cd38d113297ef1989466bab1cea6f632ddfcc15940f1506a7342e49fc2d0ffe6d797d47c8edede2dcb79e3b5ace3a1d42772c4fa4ed4e4c2d52c46133ae8cd8e0638cf065afdbed07c986fa20a7ee10e6e3d411dc24c18002a70c46a6f098802d998e2da179ce9b58f301eea08cffdecb493f9082c238385ae05279136f1ade8332441e848f580bce2ea8b7e162046d3191dfb275d06d1766c21065e03839292ad81006fecc12ed75b11677504fdc613484cb9a6541d7ece7164380e2cf163c832eca3d2817fb824effc7ecd27fb5c415345a08ea452372b71c9650895e21e624d55141b70bdaf32c769e7ade699cf248635d920ae33eb9e376126c2298b43b7dd83905f5a93c073f886ce90b5dcfb460f431922868ba00c1d87da8843f17acaa064a15d30108a49ba877b1cfd89308872232c5899af2fb136495f6ffcb0e0a523b16115b8fc0e7a89ec685e21595a8d924b8d1ef0c0780ab6d76602b5871f4c9747f229c84cfe4ce3bc6b161b1e8f8f935b00333e1adeba8d8dce2362a5601025fb8d7ecc22ab3ed61fd8fe24aeb3953ae95415be1f12b591ff83429c9b001cbc47f29ef2611dee553a27874c1749e21808ed2195d4a8c90e623af69b94c4dfd6081c3692191fcc0b6c812c260664c98b189f55714deedfc9bff27ed48980654a29735ba511f64e11b6eefbab39d1c296cdc8a5837cd26c3d02e019ec2eaa4ec5271a9a1fe648c974ac3275306e702491e5a7384454e95623c2d654d87f6d0250f12bc1d3b670da9569ff7545afbc9379243503ba4d1833a8b655bbee8d088fbb2b2455ae6529f05d0eb66be596399f8625e0a211ee50ffbefa90348d3f3c27c6635eb79de1590c70718834a8abbafc4859a1321a18b6718ec85b2de71b04672767d78e111d47aa3370437b0603798783e9f5dc53b0e5806b1d3313e6f23cbace09f0af137cf08e4e01a28ec07daa6e5afe65b4eb0a61485e19a49691d419237afae205bd7e8938f92c4c43c598817873cf11485a169ecdd232feb81dd3ef97eecd01e84af10ad0ca553d089f1a5c99834551d062768763701714f27e3dcc7f43973db567b1542e7da577e416b341f29a7fce6fb79eb4b92eadbb5f679336a21135b829b8fd78d852a18ffe4f35c1c048f17fd0140ae1e2a3fa729557641109e98d40a6c06980e09c90633b55bdb28fc4954cd3889a04605284d0e0f7294e172216843b35d16249868d8b461089854c6adf86e4423dee76944bfacc2523765a61eab6d142a56271f90ae459b717a3778b54c0713e40ce7ef393e03f2be7a99d39e4feaed8612b6e6dd37b546c4080ce065c28e06f8b86a766b4045716dfca41b64c272d01ea564504ca30c0b52164ac7e7b2e211f9c3917c5c850aee825a9a774004edd6b055574edaa302366d169298143e2bf085da69cd04e97d9a49f3618e175e443318064dd9d979f6109c820e48731b8d289107a6391b89c1379db9318fab7b56088d76abf26afdae265cb5dc1bbb08a2977a6dc429845206487d09a0beabc4d25e10a59f29892f61dcf2926a8d6b132c32393d5bde27caa5069ff0c77b7de2f6cb9d063790d85fa004e674de0fdca4fc98f1f27860b5ce264c57d8cd63e96a1599ab21883e094c13f7be1b6ef7f97ed701f5ad80a274fc6d2e6c0a75fa3afa96ed667312c8caafec6d565862fc219860f9d2860ea69fd080993a96746326514c5c2c998f718eee9ac03d0dc129b577e4246b85be50d60f817dbba888b1455093f3f67476d88084357b262ad2c906adca18e5186c09221be1715a38b383372f2f63bf8ebf49e72dc57574e0e9017462ad04e93c8c3f7422e303522ec9bde6a36755113487490defc61acfb5306e70b00107727a43df22567f7b554634c8ebc99d51a8277a697d64dbf7ee46a1d513c8caf9b696ec90aac84755b9ba86a3f13669a7477c253635a61c103abf2a7f6854ee70a6d8a9127c9e4619484095f15b5f408c608f77a279b5b3199863ed4c7be66b5647c94bb7e522919a48ceb9f7cbf3eaeda9f3a759b8b8a1b90994f6bf5ef833109dbc884b05d8af5ef247ca8464755bce00071e677f544199219f5d226b8495603b03f2d4313bb0fcf792b3dfd5129c0e7a82955f0f2b9b02f7f3113dfd4c648800de63a0068476f3f5bffe6118e18b403b9c0f3940d752a57967191945b526282c29f52a9a2c9f3372290c5dd3e742cbaa4d9cd8e2703e3519acf6a160c8c56128b2a0e3ce08de58756a2c80636e96c15cc9c92e82348cdc91f7ee58f717ba132c11e47f42eb0f15eb5fc4b933580be3000470c61a90e8e3d7b7f309cf7e6f0aaefdb540bff6dda9c96c3ec5eace6d6be752db04101ab492df146c50fa0df6bafa24a8fbf47ffe2013492289015e347c0bd6f2d4e7470f842ca35c151af826142b05d1df145dcf41b9c10064a255c3c026c54d509ab5ed85c3d057a739610e4db08867d43595909971ff03368c712e4091b3420c1045336f18669aad5eac2481bbfb351a4b6c5a070d6ded5c389439dafb23a73e4ff2f1dd4c58bc200979eb6dd63a42af19c1609d3bfdda4f6a821152b1abab840924ecdc413352b1c5b80bae4168ae62d873fdf9eda26e3c0204ccbbe59f8b2177f383f4735823232e3d877bd9b8d2eb3a63a5e705457b1578268b79a1eb6bcbad18607406d461492be05ce52f9c33e4f8fda44b12a165e9ad36d3803f3636b3208611ad5f09daaf85fbc5dfd63b220d6a8f8619e903dd581a975faee2649e1650d067ec66c52e3641dc47eb12f8779dad3e9cb93eb3574d5b84af7d90404c1775307e09f0e43078c980c66aa8cfe7b9fed0cf25d669c1a2f679ed6ecd282ae199e8bf290d5f3b7f1cf7d76619ed7b272eb1df7c3dc26e66a13999de856354fdd2fd25539c042d3c446bb4c787736ebd06ff41e42516ed10955547fb64f491b1f35b6a923c991035d40ff24c56b48fdcbfba21e46ef51327d461c68630d6b7ad9e7376e5ed0ed05b78668cdd9a594f91b5fef779b461c94c14b98db317e8f213b29d192f4e2e6ec0daae4ea793a705f5e84c5bd29d032235206eac0722cc6526652732cde80942c6b262a80c32e01a04bbfede97077b8a3e1e1cbd22a99f69a431e76c1801c76cd46fd4aa8bb0c6e3e0f15ff6534c3b7e519e4dcf57ff83be923e8612746131bd16cbca8f4e6b45910c0e52ea37762faa2b4726fcbdbd83d3f7c4a3739e4a32babbb0fd34d79366242f619808d2722fe84cdd5163d34d0cb2527e2e360c1f89e7795ec75db4d45732795b923eef249c78cf82082bdb8cc4d40962e47505b47cbe167193a2f873dcd8d75783f4dc813fdfacb6f25083ff98b0a011f3293a5b09a271d3f8e3828165e10319e87a8443da5b08ffb241780131878f84b7dc33c26091c2c5f01763fd5a880be5133a551d187dd952ebf100533f3b1f2ad5189d15efb4f7fd3c1ced6fd12f4d9a53212060464554cb8f2e8d9bce1192084ff341ef3aaeb87b959896db7c7a9407d7ce716d8cdcd4faeb4e5c672c9280f961d3fd37bd74aa31fb32fee43378b79fe2c12525c71b6a4daf4ace84a1f8b1822ff0393140df30170d06c2f8ef813e775acd5ca2278ac553009c174c218c84ffd9847f9790563a29254c86dbb4aa6f911ae774bf76d7430dfe44ee05106eb7a9c99c3fc3651532505872d49b648ed2ea220a5b6f762fb4906f027020aebe62b006bcf22bccbefc948e587a717acfef51f16f56fcb96043ab6dc778e5d653c4003f4c068861169f74a479c8fb7fee8e8ed69bf14abf8127280dfb8c589f1c8b674fa566ee3d5e41e9453847b4d31bfad94cb9878229179959c3b24db4278ecdb111490e2f40a1cdbb485cb8e6db6fc780ffb9b7b3b876b361f958b08fcd802d212"}}, @TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0xd82c, 0x7, 0x100}, {{0x3, 0x0, 0x0, 0x1}, {0x3}}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x1, 0x1, 0x401}, {0x5, 0xe28, 0x8, 0x5, 0x8, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0x11e4, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x11e0, 0x3, 0x0, 0x0, {{0xfffc, 0x9, 0x5}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_DATA={0xe1, 0x5, "f795172f3dc507e08d602cadaf66f593166640f5c1c26a6cdea054439d927e065732dedf287048124aaeb824d4633a3a53a98a62b958cd87a5991700cc05dfa6e6af47f5d238c28457b3cb3796d460b07d965405b7614251da590936449e6213e8c4d5fe5e24a60b551efd115cb6236ea96e4310ff310ff73bd594cfb73375bb020aef4b3a2a6326373fa82f56b0b1cece69b9ae454e05bf0e3f6e5e85a037970b11bdfc8d3647e2fb023efbae7516f7331d6dbb6d8b50fc1d6db32585bc1523c57aead0acd32533ebda76960100f1fd9add3ae43aa727c18ef84e14dd"}, @TCA_EM_IPT_MATCH_DATA={0xe3, 0x5, "98f2860bf883e32a18a8f3d5a21936e58f50cbcf5b82730bd5fe727cc3eefe978f27ee1d5a82390f11a751b7b1ca253837d4f4bc6adbd6661cd4b171e17a4167acc5e47e365ba7e939cb44aa2a054c52f4d5973cde168464959b63c1a07693ad7e2221dfdef09ce35e9d5cbcde8fce9cb1b5e7e3ba96ca33aaf05b5d5278340b4f5c25451836f9ee5cbbbfeb93d29659a196d6473784ebbb393638f99b5a848057a0e1251914178a1a9a45a12bb87b19eae7b565ea916d5f3eba5ead8ad0a17bc91f0f4bc99a8673078da5d709c0b8e611439d3ce60c4c901e21092aab9611"}, @TCA_EM_IPT_MATCH_DATA={0x1004, 0x5, "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"}]}}]}]}, @TCA_BASIC_ACT={0x22c, 0x3, [@m_connmark={0x104, 0xd, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x8, 0x20000000, 0x6, 0x8}, 0x7fff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x8, 0x0, 0xcb, 0xe7}, 0x9}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9615, 0x1, 0x6, 0x3, 0x80}, 0x3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x6b32, 0x5, 0x72, 0xffffffff}, 0x6b1c}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x100, 0xffffffffffffffff, 0x100, 0x401}, 0x1}}]}, {0x45, 0x6, "f5cab3666fd25a29d317d5e00bd70d1b64d83c68f66f9a886d61418772ea8694e885a8ad6f3097203d0b0aead9e08d47874272fed0ce87c17b88b159e8b82a54db"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_csum={0x124, 0x1e, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x6, 0x0, 0x7, 0x9, 0x10001}, 0x6b}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x0, 0x8, 0x7ff}, 0x50}}]}, {0xbf, 0x6, "805131bc22505af1ce918072679ac259f42d3abb485c4eb33239f195a3341fe9876831338c354ff2aecf80e98e6356a6251ba3202cbb7c96ba0fe8e968f1abc0096eed826f863c08b3fcf0df20224615bda88627988f6368ca757d46b5aa4dd19ba9dd88249d2eee624d7b5b2b512a0c6ac44042a2851918a2ddf628f143b90c2749aad5a902ecbf26f2b262f3880953cf62848678c334d0aabf80957b0af19d705d0e38a93774b7b2c32462ac960a73c2b368ddd12b07281d2b8d"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}}, @TCA_CHAIN={0x8}]}, 0xb2c0}, 0x1, 0x0, 0x0, 0x40080c2}, 0x4004000) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 17:10:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:47 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 17:10:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000880)=""/254, 0x26, 0xfe}, 0x20) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 17:10:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 4: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 17:10:48 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:48 executing program 4: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 0: msgget$private(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 17:10:48 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 4: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 0: msgget$private(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:48 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 0: msgget$private(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 0: msgget$private(0x0, 0x0) keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 17:10:48 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:48 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(r0, 0x0, &(0x7f0000000040)) 17:10:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 17:10:48 executing program 0: keyctl$get_persistent(0x16, 0xffffffffffffffff, 0x0) 17:10:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:48 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:48 executing program 4: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:49 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:49 executing program 0: bpf$BPF_GET_BTF_INFO(0xb, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 4: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 4: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 17:10:49 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f00000003c0)=""/63, &(0x7f0000000400)=0x3f) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, 0x0) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000400)) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, 0x0) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, 0x0, 0x0) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, 0x0, 0x0) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:49 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @broadcast}, 0x10) 17:10:49 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:49 executing program 0: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r2, 0x0, 0x0) 17:10:49 executing program 5: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 17:10:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0x1d, 0x1, 0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) getpeername$packet(r0, 0x0, 0x0) 17:10:50 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 17:10:50 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:50 executing program 0 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0x1d, 0x1, 0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) getpeername$packet(r0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 17:10:50 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0x1d, 0x1, 0x9) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) getpeername$packet(r0, 0x0, 0x0) 17:10:50 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket$packet(0x11, 0x0, 0x300) r0 = socket(0x1d, 0x1, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket$packet(0x11, 0x0, 0x300) socket(0x1d, 0x1, 0x9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, 0x0}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket$packet(0x11, 0x0, 0x300) socket(0x1d, 0x1, 0x9) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) 17:10:50 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket$packet(0x11, 0x0, 0x300) socket(0x1d, 0x1, 0x9) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket(0x1d, 0x1, 0x9) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 4: socket(0x0, 0x1, 0x9) 17:10:50 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:50 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:51 executing program 4: socket(0x0, 0x1, 0x9) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:51 executing program 4: socket(0x0, 0x1, 0x9) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x21, 0x0, 0x0) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 4: socket(0x1d, 0x0, 0x9) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x1a01, 0x0, 0x0) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 4: socket(0x1d, 0x0, 0x0) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x4000, 0x0, 0x0) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 596.688369] can_create: 8 callbacks suppressed [ 596.688378] can: request_module (can-proto-0) failed. 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x5a01, 0x0, 0x0) 17:10:51 executing program 4: socket(0x1d, 0x0, 0x0) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x107500, 0x0, 0x0) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 596.861925] can: request_module (can-proto-0) failed. 17:10:51 executing program 4: socket(0x1d, 0x0, 0x0) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x400000, 0x0, 0x0) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 596.965272] can: request_module (can-proto-0) failed. 17:10:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x549000, 0x0, 0x0) 17:10:51 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:51 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x748000, 0x0, 0x0) 17:10:51 executing program 4 (fault-call:0 fault-nth:0): socket(0x1d, 0x0, 0x9) 17:10:51 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x751000, 0x0, 0x0) [ 597.223910] FAULT_INJECTION: forcing a failure. [ 597.223910] name failslab, interval 1, probability 0, space 0, times 0 [ 597.263767] CPU: 0 PID: 2617 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 597.271600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.280959] Call Trace: [ 597.283558] dump_stack+0x1fc/0x2fe [ 597.287201] should_fail.cold+0xa/0x14 [ 597.291103] ? setup_fault_attr+0x200/0x200 [ 597.295431] ? lock_acquire+0x170/0x3c0 [ 597.299419] __should_failslab+0x115/0x180 [ 597.303660] should_failslab+0x5/0xf [ 597.307376] kmem_cache_alloc+0x277/0x370 [ 597.311527] ? sock_destroy_inode+0x60/0x60 [ 597.315857] sock_alloc_inode+0x19/0x250 [ 597.319926] ? sock_destroy_inode+0x60/0x60 [ 597.324253] alloc_inode+0x5d/0x180 [ 597.327887] new_inode_pseudo+0x14/0xe0 [ 597.331871] sock_alloc+0x3c/0x260 [ 597.335420] __sock_create+0xba/0x740 [ 597.339237] __sys_socket+0xef/0x200 [ 597.342955] ? move_addr_to_kernel+0x70/0x70 [ 597.347372] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 597.352747] ? trace_hardirqs_off_caller+0x6e/0x210 [ 597.357791] __x64_sys_socket+0x6f/0xb0 [ 597.361768] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 597.366364] do_syscall_64+0xf9/0x620 17:10:52 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x48) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x48) [ 597.370171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.375358] RIP: 0033:0x45e159 [ 597.378554] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.397457] RSP: 002b:00007f6ccb054c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 597.405170] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e159 [ 597.412438] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 000000000000001d 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 597.419709] RBP: 00007f6ccb054ca0 R08: 0000000000000000 R09: 0000000000000000 [ 597.426978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 597.434251] R13: 00007ffebb8bc2df R14: 00007f6ccb0559c0 R15: 000000000119bf8c 17:10:52 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20000160) 17:10:52 executing program 4 (fault-call:0 fault-nth:1): socket(0x1d, 0x0, 0x9) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20000160) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x807400, 0x0, 0x0) [ 597.497590] socket: no more sockets 17:10:52 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) read$char_raw(r0, &(0x7f0000001200)={""/19304}, 0x4c00) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) getsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/fscreate\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f00000011c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001180)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4c}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4080) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x905400, 0x0, 0x0) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 597.573016] FAULT_INJECTION: forcing a failure. [ 597.573016] name failslab, interval 1, probability 0, space 0, times 0 [ 597.646268] CPU: 1 PID: 2646 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 [ 597.654096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.663451] Call Trace: [ 597.666053] dump_stack+0x1fc/0x2fe [ 597.669693] should_fail.cold+0xa/0x14 [ 597.673591] ? setup_fault_attr+0x200/0x200 [ 597.677921] ? lock_acquire+0x170/0x3c0 [ 597.681913] __should_failslab+0x115/0x180 [ 597.686155] should_failslab+0x5/0xf [ 597.689884] kmem_cache_alloc_trace+0x284/0x380 [ 597.694569] ? kmem_cache_alloc+0x315/0x370 [ 597.698898] sock_alloc_inode+0x5f/0x250 [ 597.702966] ? sock_destroy_inode+0x60/0x60 [ 597.707324] alloc_inode+0x5d/0x180 [ 597.710959] new_inode_pseudo+0x14/0xe0 [ 597.714948] sock_alloc+0x3c/0x260 [ 597.718493] __sock_create+0xba/0x740 [ 597.722334] __sys_socket+0xef/0x200 [ 597.726059] ? move_addr_to_kernel+0x70/0x70 [ 597.730472] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 597.735847] ? trace_hardirqs_off_caller+0x6e/0x210 [ 597.740879] __x64_sys_socket+0x6f/0xb0 [ 597.744862] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 597.749461] do_syscall_64+0xf9/0x620 [ 597.753277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.758471] RIP: 0033:0x45e159 [ 597.761779] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.780681] RSP: 002b:00007f6ccb054c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 597.788405] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045e159 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x48) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20000160) [ 597.795683] RDX: 0000000000000009 RSI: 0000000000000000 RDI: 000000000000001d [ 597.802963] RBP: 00007f6ccb054ca0 R08: 0000000000000000 R09: 0000000000000000 [ 597.810241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 597.817519] R13: 00007ffebb8bc2df R14: 00007f6ccb0559c0 R15: 000000000119bf8c 17:10:52 executing program 4 (fault-call:0 fault-nth:2): socket(0x1d, 0x0, 0x9) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0xfffffffffffffe9b}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/170, 0xaa}}, 0x10) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, 0x464, 0x20, 0x70bd25, 0x25dfdbfc, "e9180cd3d18551325159fbf6fab1b28c1f65b6e91aff0f310a132fd584bc8468e071f0b937685bd38dae6f61382fbfedf2daaaad84a93ae717a79ebc4a0ae0818c28dfa1d61841d7c3c1905aa77714ff82c2", ["", "", "", "", "", "", ""]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x44) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x44, r1, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7f}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000200)='wireguard\x00') 17:10:52 executing program 1: r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x80000) read$char_raw(r0, &(0x7f0000000200)={""/94}, 0x200) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x11a0000, 0x0, 0x0) [ 597.845525] socket: no more sockets 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 4: socket(0x1d, 0x0, 0x9) 17:10:52 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x15a0000, 0x0, 0x0) 17:10:52 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f0000000100)={0x9, 0x1, 0xed, &(0x7f0000000180)="8c3b23553b988236c9a5bdef95325c4dfb925c8d6cc374af10c58070a190888b4ad08932db729364104af3dfa3afd40f7b0be78329a235f0039085941fc2bd72dc203523375e50e1beffd31fd8a5e5fad69cb5c69e1e529a822e706f719fa7966466b8f37b2a1c5c8f4947ba8c49d2773ae932c35c5ed9c97f050fb381f7018df20a8c5fb079e08d17ebd6c6eeab3024ef900ecfdf310e2f58ca055a3f7bd4ff7ae16588eafbaacaea7c7bb55e5b108d9799dc7b868876e7c4976be93c828f6f2a47a0ace0a7d1da45666f929020bce42f4d6b38ee2b0e57c9b2609fd3f1dabdaab4019e388034b2d17f92c46c"}) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000280)=0x3) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/78, 0x0, 0x4e, 0x2003}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x48) 17:10:52 executing program 4: socket(0x2, 0x0, 0x9) 17:10:52 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = semget(0x2, 0x2, 0x180) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/225) 17:10:52 executing program 1: ioctl$CHAR_RAW_PG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0x80000000, 0xe96, 0x9d, &(0x7f0000000080)="833837ef77eb9c85d60525d6875cd2f7e7d2d4973baf1da84164e4c71d5099f7c0d8967c57a6b1d293f8b1127162572ab423ef56a4de2ae7607ca0d57db0a425eb5261ef83dd10d7d163e712eeffd493049c11c72c395183c03da03229a7216d34e6664e654234ddf41f651f7815ba31c30d3bc9ddd03e907eaddca9bc1320449c25e333907c18e8ea06c9edf0152ea2747c9f5b6f65f1b7f4af998dc5"}) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/62, 0x0, 0x3e}, 0x20) 17:10:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x20000000, 0x0, 0x0) 17:10:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x1}}, 0x18) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:52 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20000160) 17:10:53 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='map_files\x00') accept4$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14, 0x80000) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0xfffffffffffffd05) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f0000000180)) r4 = request_key(&(0x7f0000000500)='blacklist\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) keyctl$unlink(0x9, 0x0, r4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000440)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000004c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r5, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x4, @private1={0xfc, 0x1, [], 0x9}}}}, 0x30) 17:10:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x21000000, 0x0, 0x0) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket(0x1d, 0xa, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x1, 0x40, 0x8, 0x6ff9}, {0x9, 0x25, 0x6, 0x8000}, {0x7, 0x4, 0x23, 0x5}, {0x5, 0x2, 0x1, 0x9}, {0xf3, 0xca, 0x8, 0x7}, {0x1, 0x1f}, {0x5, 0x80, 0x3, 0x2}]}, 0x10) 17:10:53 executing program 4: socket(0x2c, 0x0, 0x9) 17:10:53 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@volatile={0x8}]}, {0x0, [0x30, 0x5f]}}, &(0x7f0000000180)=""/217, 0x28, 0xd9}, 0x20) r0 = getpgrp(0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x151000, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xb, &(0x7f0000000280)=0x1, 0x4) syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/ipc\x00') 17:10:53 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/56, 0x0, 0x38}, 0x20) 17:10:53 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4fab24dc", @ANYRES16=r1, @ANYBLOB="000126bd7000fbdbdf250600000006000300020000000600010004000000140008006772657461703000291193f98d260000000000000000050006000000000008000c00030000000500130081000000957aa0edc025e902bfe157d9312c7fb4ed2338d649bde6b881ef8d40008c911cf98b2b5ee8c2dae4e1668c941c15fdfbfc3785bf200eecc56f2e01d30239c24e44cef0a6903aab982a8a1f5da1bb31d51472acda939df10d0cb8769dd2061395e07545"], 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x4) socket$packet(0x11, 0x2, 0x300) keyctl$clear(0x7, 0xfffffffffffffffc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0xbe, 0x800], 0x2, 0x80000}) accept$packet(r2, 0x0, &(0x7f00000000c0)) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x400001, 0x0) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, 0x0) 17:10:53 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 598.356522] can: request_module (can-proto-4) failed. 17:10:53 executing program 4: socket(0x1d, 0xa, 0x9) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/52, 0x0, 0x34}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/dlm_plock\x00', 0x410041, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x24, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x1d}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x32}]}, 0x24}}, 0x44000) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x48000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000480)={r0}) getsockname$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) r2 = syz_open_dev$char_raw(&(0x7f0000000040)='/dev/raw/raw#\x00', 0x0, 0x2100) ioctl$CHAR_RAW_RRPART(r2, 0x125f, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400), 0x106, 0x9}}, 0x20) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x3f7, 0x4, 0x70bd28, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x125f, 0x0) 17:10:53 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000080)=[0x1ff, 0x2, 0x10eb, 0x4f5, 0x3, 0x4, 0x10001, 0x5, 0x8], 0x9}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xcc, 0x3ed, 0x8, 0x70bd2c, 0x25dfdbfb, "7ab10e969723adafb64e24660b478852dd9a1d2ded536719ec1d742c254553e598be4822f684165062d43470a4b4cf240a538dc18513883490fe36c8897755c9cf4f3e7aaa8169847614c166cd9d65770d9a7ce2d86ebe44459fd24c6e05365cc8ee5d16273fd394817818a912f37df69f50ccfa90002b69d3cc91fad189a5472f355c23dbb998f10e3986c0f40415016582e88b7012a6549d276120745ad3d14765f8ddce771b7b84218a3894f2d3fa5d58e03a470556742b03", [""]}, 0xcc}, 0x1, 0x0, 0x0, 0x5}, 0xc000) syz_open_dev$char_raw(&(0x7f00000005c0)='/dev/raw/raw#\x00', 0x0, 0x20040) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r2, 0x0, 0x0}, 0xd) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRES16=0x0, @ANYBLOB="080025bd7000fbdbdf2501f7000008002b000000000037000100000800ffff0000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4008000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c820c454c969a779e82f152f44046a1394a4bc9e9d2bd1d1b5cc979a5fff232d1b31ca328cec7fa1ff00000000000000", @ANYRES16=0x0, @ANYBLOB="200026bd7000fedbdf251100000005002f000000000005002a0000000000050033000100000005002f00000000000800340000f80300"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24040085) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x18, 0x3f9, 0x4, 0x70bd2c, 0x25dfdbfe, {0x0, 0x1}, ["", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x11}, 0x40041) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f0000000000)={0x7, 0x2000000000}) 17:10:53 executing program 4: socket(0x1d, 0xa00, 0x9) 17:10:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) keyctl$set_timeout(0xf, 0x0, 0x5b7) 17:10:53 executing program 0: keyctl$update(0x2, 0x0, &(0x7f0000000040)="8d5ae0ec122a1f4392f546afa6622e654394788eafdbdd6181414cdf8dca04b80f2dcb512b0e05affc899d3325b0f3c460f4e10dcaebfe58112e02573dcb0532dc362f56cfe47e2902b0e49a9bcefb38bd0379497321d85b17c7d25ac896e854963216f89a7258347463192ce3ef4ad9a8daec5e50b4b75c392ea039f267ac4215fdba1233c9c2627c7de7f95a26f5efb35dabe727502ed7c629c025bf0628682fbdc570a175cd024ea93706dc28796e73e1", 0xb2) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) connect$packet(r0, &(0x7f0000000100)={0x11, 0x6, r2, 0x1, 0x0, 0x6, @dev={[], 0xf}}, 0x14) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={0x0, &(0x7f0000000240)=""/59, 0x0, 0x3b}, 0x20) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x200, 0x0) read$proc_mixer(r4, &(0x7f0000000180)=""/191, 0xbf) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r5, 0x0, 0x0}, 0x10) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xc8, 0x453, 0x1, 0x70bd2b, 0x25dfdbfd, "0c2b13609edb43d2cc08a12a906b418b0ca63e52f7765ca9df2eb6ff0fb83a9c8cc223b112754dfc0f4e5045820353b41ed1b941e21539f3314c1345c01218b616863601d86769c7193e41882d93ef34f4e07baed6d980fb26038f3b101b992142136c1f85267359a788f45a95875caaee83c23f8587a4c014395310408a29201f0cd3d2dbef663ee5b69ad4a7542d2fc8f478c9f8060701f16cba155a39513e9fa434a3c58a451ea03873c8b60753ba86c513b3c76409", ["", ""]}, 0xc8}, 0x1, 0x0, 0x0, 0x20002001}, 0x4000014) 17:10:53 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1, &(0x7f00000001c0)=""/113, 0x71}, 0x2000) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f5, 0x400, 0x70bd27, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x4004009) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/84, 0x0, 0x54}, 0xffffff76) 17:10:53 executing program 4: socket(0x1d, 0xa000000, 0x9) 17:10:53 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/50, 0x0, 0x1b, 0x100004}, 0x20) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x4, 0xfffffff8, 0x81, 0x3ff, 0x5, 0x5, 0xd52d}, 0x1c) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 598.562888] device batadv_slave_1 entered promiscuous mode 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x8, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) 17:10:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 17:10:53 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000f703100033bd00fddbdf2507000000070000002e2f66696c65302e2f66696c65300000"], 0x28}, 0x1, 0x0, 0x0, 0x48014}, 0x40010) socket$nl_route(0x10, 0x3, 0x0) 17:10:53 executing program 4: socket(0x1d, 0xfeffffff, 0x9) [ 598.604941] device batadv_slave_1 left promiscuous mode [ 598.616929] device batadv_slave_1 entered promiscuous mode 17:10:53 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x65, 0x31, 0x61, 0x0, 0x63, 0x64, 0x31, 0x62, 0x39, 0x64, 0x34, 0x64, 0x38, 0x57, 0x62, 0x34]}, &(0x7f0000000080)={0x0, "6dca58862046dc83e2fa6184ba0455bb4b2051a651d3b0c749727048d0cafbd8e6eafefdaa7fde0b0f0de9cca9c330d6b82542911510125d287df547caad0117", 0x1a}, 0x48, 0xfffffffffffffffe) keyctl$clear(0x7, r0) 17:10:53 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x60200, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) accept$alg(r2, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x7f, 0x8, 0x40000, 0x7fffffff, 0x0, 0xcd0f], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r5, 0x10, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x18, 0x17, {0x17, 0x7a, @l2={'ib', 0x3a, 'geneve1\x00'}}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0xc090) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x1f, 0xe45, "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", 0x80, 0x5, 0x54, 0x4, 0x7, 0xcf, 0x4}, r4}}, 0x120) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000000)=""/57, 0x0, 0x39}, 0x20) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x40}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x81) [ 598.686948] device batadv_slave_1 left promiscuous mode 17:10:53 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$char_raw(r0, &(0x7f0000000200)={"74b93b247f0739d798d9d78b92218bc465d7d83d441d3eb0cb01939e39a487700d2b0c91d314611f784fd7c01db45a2480cf67f87222e37c281bd62aa39e9c7dcf452cfefbd58fe2691560ad1b1201b20cdc6e4b0e03d3a8194aec71ad79c4f60530ff94382c8268cafd9f02ad78455bd8bc6b03612971a83acca2d756a50e8e8be7adb710c2c2f4ae108073bbc78d7efc3af503e27b743af8a246e0c362c1eddf0ee048255a3a31993b450fea8d86bbd82eaa33163cfa46a54d414deddeec0c668f4f00a944d6c0cfaa13974dd555a58a8fbf9d82ff584b5a6fbcd908ccbd522fd88f4a849922302073026155467ed8af12aa03e7657c5cdc8bc3bc6c51ca1d0e972287cb4ad44f5751e44bce90dcf0c4123f59e6a1877355c10952f041b8ae31b905b20db7e5e38699ab959dffcbf665b3d2ebdbcbc35c84e99cdc3b293f8c9c545f902c86a1d5501d1184351239d5bdcec1a3fbc352cf98b19416185a516431a298962f2a477991c9ffceba97fe4b4282cac1e5171aa81f6c0e808af609ad84ea78f21336fd5f4f9c7bc8aadb6e4db89876c83198f28616bb875ed1a84a24cea610850ed48d6b6be48aacf1f303e8a6100cfab264d0bba4e927c4ea4424553a3817fa47c589da543f599cd28dd3a5c78809cdb5c9c4bea68daba40540c0e564d96d5a947406b8cb89c94c41913a62ebca2969132282009a982b7fcaa48c12d4cf50481641527d58b7619f70b16e35010b08b16fd356ab24f89c8fcc06410483ec91f32ea7d1c0e86e76fcf10703c31f9b1b81db21acb0db0f852550dea8089f4d8ac6dd6c85846f9f717017b80e3227db412ef9e9c7b4b75808e8aeee57ad8ef9f240ab349beba8703c2638a31eb63c0adfdcb36edb127b2468397242080c774e139dd5473792f8f62c2c34e41a8a7cece3eb14f7b2257a25c71f6646593d92e596729ec07b5b9c7668a370d25b56003cf11f89e17da7b557563725b5e90819a6a4442734cd9ab844ebd53c2fa0fc12a63c7924b96ec3a7f716b041e11c5f8c743f198f77bd73ce2700666c92bebc205add50d509aeff5b116a8daf027e1a70cb134ec44e531c3be0a8150c515f65407f0266851187f8ca9a044f7d5dbdd4c4500bb1f5469426563890ea6421abcc94438913f286f32c30a5487ec9ae59339bafe59f1bfe52cd24de70db6ccfb7571b4951712c59c86110325bdec2e2d51cc949620d79ce381e069ca4d6788bdf1bc0ce52d9e132a8f0acb1c32d68f0524f7041bcec94995161ab26ba06393e396ebf4a39ee6999a3bb7c95d368557470b6dfdc7c0f71b6cd02438baafc319f1b170b53889235f190130d318c81fdc1378cf999d3214ad15a0e71b52510cf24012c8be3678a5c41ddec06c7c575cb46dd25e78b984faf2118bd6023bfc18caf2ed4f7033d71b282fdd32e5685d10fb6b68d6231dfeb25637419e3e5bd5b80b2eb252a7dc6c5b39409f80663a4925930a79a9d5879492c0eebdc372436d7dd5002855dce1ec17bba043bb301dc952a240710a6029d1e88f93fbfb6f9f18910031045fdc519f8c29effec654f5d3b7ff9e18c276b9168b37fd6201872d2cb8f3018d727d2fad2e1cf7a5d17a32b70ddba8f620851c18081b3f3915f23aeb4356cb372eb8bc3980e404a2d70314b0be4e146d8bb4910165bee1d125aed05eb2064a79892200b76f8386b845b4b7359eb894daa10fe9434c6d0dd38844a57c5251b787397d976868f25e3d633d9ee9852d830787a9e813dd193d3d5e333f4fa5ae6d05a11ca76ad47624792e227422607e6edc0ba8e75dc312ede9a4a97f9f6a46b0db7c9545069cda20b2a713a1de31169bb04cbcec2eefa802fc23df138e0c2fa2db940d9d19d039ad293d34ed478b8f9af8ff99de7ad38382dd362b4684827e9e1286a8352722737f99ad02086a18c8e1e81101114dd4716ba3acd0d656a8ddf5e220b29d217793b77a1ba1dc250294d05dd283384f01876f5d095a78d8f92898723a59165b40775e02336a7a177628e9f4f21d02bde97610d6f0ce10cb8da9c3961210cbb3c7023502e45b6cbc8cdf68071e1f52e844531577120ff22ece4caa40d7863d776676ec18aea4778c0b5776be8b553c60a20e1868ffceddf28d68c46f0c2b48debd6744f4f6bb79c4a6fca9db0368edae86314648b1d8d2474c623fdf8144320abcdc141ebcbd719f7b7dbf806509c769a3a28b17cdf974aec07139546e833581e2fd76d368a02670327a01f1445d92981bf1b5732b6930f6127e7cea792370e9a2f360c5c2ae88578ffde7643594a6f78d69c51dc808e7c065377b449fed7d6c772500fc09e71a0be9a347afb7b8573fe256518afc5f1f49fa12bd263ab46f4ffaa1db1a8d2713db7b49a992d2542b0eeae4734961d2830b17b73d39d153ac9ed7c964e73be6a1d8cb1bc2860cdb3746fbb464468a018825af9e6cda843dcc70f53bf8e6e144c70ffa6732dad5f3ae4582a5aff21ad98fbad2d68e9567478ebd44a6a0ff7c147f8c40a1c64013ad2cae8daf387aa3d71a2bdae16622fd04104d220ce99c0d691e60ffd13ce0ef7a977e67caafac536239c3e13304f8fdfc72305c01efee555ce2f9dc4388b10e56a702ab203ad516a7efcc1eaf8fa31dfbc8770e306ad3a5af9ba174714a8883508133fc80dd056f424de2ae30c953f98a9b33c1be1c6c2169d718e700f7c8018c1c5d148a2134cb2d65263b9c8eebbd54d237698f8f8ebfd9a69ad9851bacc0093f32d38d7f1145c3aba65a095c203b178b5d825a7e205b7a3c9bd4099f5e4ae2917100436d11b8023d4aa6b0fdf338a9fcbeeab32e8fe866268aba7fec3f5dcc8cce08648902316a2dc02882e97d23fc4efebcd0a7e36c84e105e3bcdb80b279f56823658d91bd9cdffd360437e860ef60f3a0c2a21cd60093970b32e874424ffc64a047840bac0f97dcadaa2214771ce1fde553d34e40daee351b67f1804e2a5d143e746aefad335f606290a294ec47255469f0152190806c86c8c87a831bfb9a4ea854891cbc77e6e803b450dbccb55b3e1010af99b2d0d1b9605db13e5dc0e44ed65cc5da559618978a1065664b371dff5a8b6d89d4f1ada7903d8dc3394ffcee292f02baf7f0dfb909466f84d030e2d236344331bfde2b3b94316d91b4d21f08b757684629334aa1d34f5e3f4bb85f08a6113f76f8d21e26fdee50b5ab9fe9df053c3e1adef7a0109d67a616e3bd0c777fd38f163955359909c225cbd15efb29d3301a19b5ef9008bd20f6acd45f08dd21884cb9885f659b09089a44c3a8366ca815093c2e5e264325681d7cb21ec0f190a92e7550630f9243e074f808155264939555fe17d085c11baa0d68d7cce7a1caef63e6f42ccf901238e0c63218f5b303a26ab908aaac47682efb77973c48cc5b91e08685cae8e6c9409530566423c308cfcd030bec94c2ec6546bf2acff14040b63b1b37489ff4eb02d173bce239b92f85608431b4bdcc471fe09bcef1c6fb1e93f2b85a9392543a53cef2e55174ef631339a273fdc0c96c6d85672c5015e0b6c3b389b0005c31a2cb175fbb58156392c745faa45df859c37cca1e1a8dc7536e94cafdf4858279a5b914662012ffdff4eee4c4d9d4fb9fa265f260e35cac8d7441506593f28b64125c7f319f65d009109e9a04bbc5aa0c5c06fbd2eeb057211fc694e19244d8d0b311977b393eecc95629ab5fdf7e2338252d6da8e457141f454b88c27308e6797de73abfd2cd350b0748811173c429f5a44a1151b5a30ca675a5cf30c99c31b77a50a34db78390e903dfad8c962d978680fb650c5d38521926ec0e1dddfa21a03addf594d987e43fb4bb95d84e96a8f2858d97cdbae246a3a934b6f104ae4b7694b1a2fc9759306f4f97b0bf30417ba6088b3f9ba8409f850002bcec7355a721272d9be32810aeec3d8cae192fc8a7e64218315286c9576ffef0511aec52059887514ff36e076bf072714fc2eed44e9bb0053df49702e536144820a4a2f5109fc11007a732f26563d4ec8789a8de945eb3608bbaf9fe7e862a401592d6d9fc97eaacbca762c89f6c5d5de173e93255764869287b2845b65cacd53fd4a515173d0a4ae93ef7ef80e74f6f553ea21311939a74940f1edb9a669353f20970d96f330e3e9ee4f9fc1fa4cb7ee1ed8eefdf571f87cd655c887521823244fdff95bfdb7705f36d21bfacf5be8cda25ee63bb3d5a4846cd51b139af1f28929a050e36cb2b7653d9d6b0a54a5613fdbfabb0e5b3a580293a28d0258c01302e467a193844f69dbb85ffdc139844cd15b8d9181893967ddcc6b32950ffa268a7d551cfbd82f9238bfe44c08276e56f7492dfaa1e4cb877ed0ef524f28a847529aa56812878ff8f0823561bf248494dea949263ce7cfd4677240758d32c378876378a05004729cab047131f62014d604ac9e0cf23b014a4cac7252a2c0df1284be6097bbbfb2f6ccf589e2825bb4b91aa09b9a0a4b992fcabcc9ba46d0528afc4e9313d7723f019b62374fee4bb053d58bddf1ad5bb39fa117d95511d3f7b6060743267c09278a70306a43951db5b3d92247c12ddd508d4aee7c435cee241374f4d3ec4dd39148508199a86cc40f7a04a165e2f03db154cc8098ce3571af01554b75bdd68600458cde0cdb9b9395bbebcb46411afc9305baa18ce51e53a7452dae3b30ac853718c02b65e976915ab4840f66c0ab2431090e146e08b743bbb9c6089312b20a30e5b64846825944212452459ebd22720f43f1aa063e5a0f25b063a6dfa3984e5aa9939af34a63510a8d5a195f021eb525f6b1d47106a7f60f1ae8b371bf667bb0154a828de911a9e7f40eb3aba48177c006d61665b835e39f36c364d0eda4065d9aaa3eecef11831e1a0297dc7c59c3a948bd4b021f3750efb1ac02f97cbb2c067f6a1744634bd6a8d6cd459b687ee18fba1222b4c6a960ea08b123739834fd82fe203a6c7452d1e41a665f160406867bdb88416f524fd5fa4e9a9baefcd520219a421c1f5ac981299d202e3a72b3477f7d1be2a7932eb4b6ba0acac5a23ed16cf23c8dbc86b5793b74e88c9476e38129bb85954779846883e4dd2460492c5edb9647ac7f785d5ca4fa95c0c4a26ded63327859d549db19572408bae7314171dcebfc51a8c778df5bf60bf137602dd2b53875fecd89595e77940ab0365bdb4d475eb59621792e164c076315ad12a331022fe639d4dc11baf1398eb41bbd2b116fb0880b7724ddba777ee00d8b0dd474dbc50deab37a21d4fca57e7a372d81cb5f544c2e7cf83f4c27f35e4b0febb8bc77522cdc6ae6232be82c942ddc572830d75baf9b0536215d1a05a94dbe7ee4ce2d4dbbe9f5b345a45be168fa72ed774587163dc0915e9dff28d0da788d5c5889c0c2b21c71312dc1372fa56355b67cdad2efad85263cb1e3678fdc528cf2808e5eb7e0b8d11975d98cb069bb79e14a75c9793c1e3eb43d93e2888643075087ddb2a817e07ab4e90c5efa460a7e9a286e32ef11843571dc71d443ef4ffb012ed576968d8837c61b1f2489a54721e3e664ea7564dbe8431ab412fba47170e1800c565672239fd8bce9d0130ff728601dd316b9772dbc2d2133df437f2d723e2f3b54615b8f49d134026adb24bfb0245b2f1d6f5f013517cb2c6157bfdd7d55e2a7c11129bd3523ee4f660fa6cf0a756769d2c1d4b9c57b900a20f7e03fd25ecee936ad7114533a19c193dd697a3a62854169d78ba8d9063763bf5e784577cbb0208e446140dfc8af8db0d5d3d3f448885e082adaf780bd07d597057441ccd3970b94e411614bcf9d9bec19b350ebc1f0028d7ff14d2d23ea59f4f30f7fc07f68c55052bbac718d8938e27d24343fdd71a978f5c4373a433613a97e29807d31e2a7ec4dd2b8186325932bdf0db4f23ad39ac7b324490eed4057940d1539be04650f20700bab546dab9e98f02004bb9d3f5ca39e02f19bfc3561e465d4d399954d80068f134d7797477857e8fe675fb4af0b2750b30357c1b08ff976cc5c20def61167936e2d8a8f7543c16c07f53959a32a0577a74a37633a3b56ca2554e2ada76a99b9fba896d7368144aeacfbfcfe6f3d9abfb8e93931f4903f74eaf5870fd6610676c23f22fbda34093dd9b072f8971075da72dd381f15d6810f20e2bead05ffb1340744dea3e9f0022b335198f5036f67438017986d2cb7a0966672cfcf901d504969e70072c8463b5dee816d38c5efdb8e124c0a0f8cb208bcf5b1919766326c2a12366867046e424fe27e37f90cb59699d3f8f5c9478d2208329aa772c83151a76bf66283c7cd07fec98e1b087a2e895c8e4a6092018d271e332755427bf204bb7e7da68508935c2b70526ec1047f70181448be54081bbb4738f9688d8926a2b4d8eaca72e1d5199ebded400642e187cb6e5770a543883f65dd77d7b966fa81779a4623f34d0a4e66c24db4ff81bd2311e7b7d6b70a16c5c4dc1e392c3ac39ff64e02ba6d335f6c63339b19e33ef4d06677f856ee273b8bc91b5606559f59219e98a801266e7ce528de2b582616d7c186eecdc06eae09e8e26b05af67de3a1dd958d452b12ec0950a11a0d45411f9f5dbf142ed37d587a5b4a2654d1e5853333dcef215b99c3d87db90e9fa1af66f5d462192f3703d9c73b790ae51cf05a09aa8fb1fc7926534a6d6591d5b977556b143f499194dddbbc1167d8a0e83cecb80440900d8e9cae30a4b537304c6ebf3e8c8f2b8c1dc98b21285aced835169f0cd42d02cabe3e734fbc9fc2a333c2850d9c6fee7d80bca75e22ed87bf1a51662519377c3c41c44dc785f69981517150a988369364359553270223a5be30180884d365e5e4f1d2f61fec32b3bd2e937621352f9a5c46afd2dd538c0547a0ff5a5873f940287cc31e9a792bf54b0a97fa5d0c9e9cf0c3c62c5460b7cc1d8ff90af91bd2f84a4f6f0f2b894dd67041fa479fad6c2910547426d35800099b0abb6186fb81b143dc76bdfc57e64155de42ece2ea61b07112a901e4da8bd4e97ff1aa8a4648aff35dd613fc8a70929a3553f6ce41abf938df44906cb0d4828edebb5c5a01a2af50be2941918af98ebc2d372a9599390130f659cd2a000fce50b6bf9571dfaff5b1fc64bdb02f403e4e78f06ff8aa03bc6f6f3710a3c2e64a39cfc6e79f845bd606b9fd9d173abbcf3846cd39fbfe0ded755c5aa6bfbac87bedb900a1ac516010fbc4becb15ee074a81de781f0a0617f1cb25739eba936bc94c95c0fda17ec3dc418a54016cb9225005bbcf07d71f59605a8cb54704e850a960e16a4001c6b100dc35946b02b085831c15abdb4c07874053bae0db6b694b317943ee2446f48d97dfe39a6aed1681b197dee9f867fe7b171026503f7a8e0d56a6afd3e506cc64f1d2e7fa675462cd31675add7dc2e92324a6ee4e64a2233adb99081905c463cef1145bbb5de10dcad1c7dffe5aba1915c182ce16a39cdba14e5091b27a6e72885a5cdaca324ad30eaf60001da569e3f8cf2cc5d62bf9392a254b3ec30a0a785c003585b2817e0954bc03b12521fbdedded7ad495a9ae8f135cb76523754e4c9e0b6c11fa9b5b74f1f8c85c783f2e3b8cfc3ec54feff360acef8f986d84e33708e2a009a8c34b5a560f0d0f1ace9a115d315cfe21b2244a30e17a6711f4210e9b95a21eca8cdd0b81e1fae24203c8486a15366188cb6d365643c3341e20aeb1fd7c4226b100b79e2cf8500cba0f69669ee9de8fc677be691bd9629729426c613e9383e334eab8967358514e9a20e1956965b599045ed81c3edac16055d68995d16d6415ed69ede009bb1d835fb8a3309cdf5588829ea5e10755dc833175463bca69adf98c02fb732cf72ca38e9554d022f96d05dcaf0cc6b7f81f61aaa7eba283ec2cf2e9c2a669dbc45aaf25914bb67194df7a261f32428be39acf0d7f239e8e2eab94262724a81dcf89ee9fc91e774dcf01b5df24ab5b3352af77f1fa1ede214ef89373000f339eeb588ff8662ef6f36841e72a4c8631949fdec3e6ba52f5e753eb4a8b48ece019692837a11df22eec00e20cc58a3795777faafb83fe55386955d9f53c9ea97480e8224b432826b6a3b8a1c5b56ba41367698e110a6b7e2d32d06422812320d0c9218531af0051c5c18920492a49d3193fe439bb8eabf79296359b59f4170f6d9f4ae07d3ba1de10e6251854e148d3291172ff0bb796ad30c86cc2efe36fb537a2af24c67ba973c142ea800e38f690f8c9d3a6f0888561b9c205d1676d3101ca082f42ecdf6d810ed72ada6b678bf5e14564cc73a4f9f50aa795f09ad8072d0d2453b38919b798496000fcb237b302d5f66e613c58fe3b96d1aaa9cbe81a07a9faa352cd1d5bde079d5e04cecf7c493958ea2a1b8a02ee8af728fe0468a845eaed984103f5d28920e3523870e439c8004cc0de4bbcef5a803a5822eca810ff399e3fdc133aa229e234982b29e5200f565410709fc0366f3f9953c24a8900c5fa22646898efa47ccb6e8fde85d4b57d61b233889725c01efd5b73a7fac6074554fb3ac68bcf56f451b7dca72415614d65a1628f0e9dda53cb8d285bc96598e6f021718fb91b10fd3c1a96ec9967a1d8d10105365e08e80aa264d6cdc4f8e19d14412b2231217a2adb2f879ed5b6354d3094c98fa8c36903526c4b40c7d5457bff9c62f82c2c482a91e9fd1e73397df8345300e6e50e6ff352a31e0a88c523363fdd1311ffd1adde6e803eb0766af4e0cfa20a150d65090e51f3ca50ee9165e6150db3895fbcc5b9501fd6a31423aafad1de88575e732971175f8ef65ea818d1d5cfc6bf6e04cb66a85f3c0df211437c328c3db7ce1d49704b212d2bae39e4539e41ac9078f5ff2d52a7eb3aec871f325a8a01385f5342aa642f49da59dec19586daea7b39b527fefafe4d706d850d9cccd496264a7a249f5db791c1d3b2ced5de4dd3adc236c490f7843eee113509bc4e69bf929a14994e300c8ec97dbc888292029636e55e6abdcc2b851ff80ecc0adcf88ae6a0ed291cc110bad192ecc5a2ec8b8536cb4a9189e98784902210b87e9d728b6eafb2d978e2febced01d2eeb5aad387d7528e7221464d331c437f562c000374139a753367a06461a61da77cbee8eef4f6e47af617d58cde35b87a87472b89da372e49b1d060e610617b2b40a81f35821161161b62e1284c312e11bafec84430f3086c40523852f907f61c18fd76e5ef0ad519eb511da935fbeb1a732dbc886bc82a7bd47a148b95efa384dd0a2ff2db052e31dc738db667cace93a6c1d257a92628190fb83953112a288e74372b0ca0b950fca406c3e5d2bba703c21529eebe637e0895f43a4b56797711fb03eeb2d258823e8154accfdb14ae2329fa34d58b3d6ca56d58193fc37fe5ff5420f607bf16a607d18ac49db7dee6f43a2b544f0a93d495ae6d1701e34e05caf7a8900ef23479b0b0059379eb4644b3bbbfc6b019e5d04a8924861d0af805351c6a6d2b25b53504a00e872803376c52f4ad53b27eadba5d7e587410dd961afde686e38e71f663766443ca5e04839af913850b201c772fd1096e15ff22c5065147eacbeb5620d4b64aaee267036f62eb0ce8af80faec7fde284d44e7fa248d50f0983b7001bb74f0353499fb2eba134e7fbed8b84a298847a2f3c30cacc662d7758c919907173ae37fb8077561134b6bfab6c368b47ec6aa7cff37f11170e59b575066d68f37696d25f89c158642f08654559dffeb21abc4d8e583e69a34e36fb8b0c51f40b4e294a4685656b020f4e39c11059c3e0980da973f32565f9b91b5da186927fcdcda993695f145fff4831f8746024fa19c4902fee01212335902dd364db25cf6ff444b0855400b3d0306d13fe962f801d6926e21611f41f9962421f5d128e8f939e85bd757d008b0ffa6c37c73f96efd11b93cff5732774b166679bece6893077ef5a1f24fbb590b76445c7d47fe4ffef0a6082deb13441d2116dfa9f5d79487ef5765e5fdda132da29f14a81c1205a7300526c0962aaa5ca9d553f69ee46ac9bb3f93ba841c1f4ddad81dd64dc0c29c1f837b45a80af07d573f6469719ca2738998b1fb9a986ded0c9b68c913d8c29ea9a34de74a74320539d7dd80844868f51953783866abebb158d88a319b187e4568dde24cddbb7780d8bf792ac71da6459ef634d16b151512069f53db03f7279b6ad5709d60e147bf67167e137608e4a823cada679bbfed26e17c2cc77b134d8a53a4a1a31185138b12f26b0235f1120eb7de73e8e60ed720e09a6e4d4a20338cdddf96c8ee69c346c6caae7c0c82fb9376d2693282c12dcd9fca1239757e7278d7c98ec6786cb65110ab60c6da7323f534054616b513167b79741b8d0da85632423cd5be6a1ea7b938a085ab9baa93fc0ab6796a8ae43f3de7a2f8e901cf00d1f99c3901d0834ee4442c2008a22926f370d5ce1a281f0e6fe0423c4d08f2878ee367b0ff407282827a6d8c00f483ea8e0399d8728135a2ec1888478c694c92827d51067c0b6358a224304e06d3342f95705c5d9a44432c8adc44aa2fee3fc2251c396324195c36960791f6b431da765ef4d7fb693986778abfed7ac3a165e40643f8a3cffb824a220a4134ed9c8a64027cf84919f978454480069e7c07c22f2b9f8275a31b4c6e62c2966476b6721d005767162cca3459b7d9d651e48e5c2487ec89c15944a50476c06d006ffbd26571cd22c1d41683a9b957f1db4a29c284fa97a226b735f70cbcafab79ecb5e6a1802a9e143d9e62dfa7500c1cf9a4fa97a5b547b5c0ad023f45946151b74194c67fd79b8e88bd299eb528a09967f6e228279988f3b93d6c3c2f86bffc3214ad7a76e6595dbec963a025118f15a812fa2b2a933a6a6ead2b924cc17c7ee670d4065db2111b9a881ab1238a42068bd7a5d03f18eb91f5a544c073ba30ae1bcc80a35bbdce250dbc77393321706b0a9d0469200232cf45ed6b8ba1528d7e0f1c1a5afd69cc211a7be743a2fa9482cff61adfdce06f3526d561092df3f9215599be17be11c463d0c8306e65021661687dde0d87e5c804771e01e3c0de47f9c7fd62f45852c6f16d0931cbe5f2ed347b83496cc9167ec5e3692a1ebcbbc304013b4bd13cd91b8b1cc61d27fd470de8c40ce9637f6fb167029751b99671fe78198c909e1e781e7a4891dacfcf1fb6aad735c41dae39665206f5737aaf50997773eb1ae76c2cef9fa8cc43d7a5a3924cf9ea7adfbcb3bc07b7cd711cd8d5973aa142a6f635d10c94e552dc6979ffba5570b571b5ffe9fb22ec1dc6fef55faa4ab8a4fe994104e705ba14a3b4a0c5f67db71e541f96b36ecd75804f09b390bd715f8e77927cb9eab5407b8057a429aa19e74bae9cd85e70382c7dc48967d3389b560415a040293e098979f1fbd562ae290f856bd333e784e88d2cfec66606f8da9342f43d026fd1213e0d859c93be491bab3de16938410696ecff4363d63737dad105e75bd9b16f88cf5bae7e9ec35a4f0bd35a6760cf5ecea669248fea83bb84af3629f9cae675ee2136f119837cc3e2f675a1288a984977ceed9651803c1026a6a99b35dad10b3a789a9f3cd2a13bd3914660158f0e5396d5afd90087411d8ef2e08bfb0a5ac7e9a62a9d186ce4e290df9bea5cab7d96cd41f79221fdeb4171a7157bf19d9b6883d005ac7c27a5f91241aadd1632ca0890331640d34b60b228925488cb05e0011d86d920641b32b6559459b9a225a71449527c0ddd1910a8909abb41fc5ef96a0ab0473ef813b9e9c4630bd454c93bbb33aede3a75b60610b9f59038c780f21c82a4f46631f7e6620367a7ac143f452f271ea98936ff212c4827b598eed2f4621102c442e66e6aca07c0ebd5b43c38f6966e3064cc6297e4bfd8c9eb188925332f86d6c7998200f523f28d43b1df82eafd0c331ac1e7db669bd06969f98b4189b67100b98c447d708ba9e016645c4996eea392a95be895a54d1eed17acee9a89605cf2d7c6579539e19bec540b6abbb1da80f7e4238a6b5d0c1d703a08d4c9f7df5f1cb75131b49628a76b232a3af3fd7f8953705bdcb11d7cfd5c8239431269b15c86fdf686ddadbc030d34457ec1e7c8eaf7e60949b27d57a84b4fef83224c09ac3ed587ccd37619460c6141e65a1c462887363447bdf4926961951569a04175485282eb4bac83d7d849bfcf8affbf8202e3fe19d2a557c191ef3a28ce1a0a7fa29f012d50a94b1383d652613d433c9e9ed75daac9a706200be69c25ed6a327010602c3a3f00b0e44544ad2ef01e1db05c85ad3d908adb9876f6ba4621b0b428fa81dfbe7020f711d9b1c2a24a91d876a5c4748fc38c484181913be025cbd2664a4211381f42d4b1107954887c3d693fc98172b25a1319e917c5e61ee1d0a9e301820177905e4e5371cea8b4911e31c6bcf56e479d51db3cd242a0fdfb363e660a2880530d0894bec36d62114796b94f6125978547945ca09c9f083e9046ab8df3781042ee2c534cf39297fb6d19ff9df13e50d3731e551d3ec20e0eed4eedfc5bd5036dda30c0463d4687d7df6230848b9925ce4c0dd5262c5114b5af8c0d465b3358195c890aec1b4b815fdfe2635cebb07c2a4e0949d5ced5c2b16aa75dfcd5cdcf6164b36b692bd03b5561a89dd15e5ad5d2404fcaa6847e0c3e111ca0c2b4c2b7a514028e3330230af99b40e7c2d283c8deef9c692ed76290a5a6acb2eb3ae8bad2fa9d84192d675578191c523096af1e83d003f2bd8b0b81ddadbf6ce016911b04b34f471c666b77c591dcdda6162c43f94306ea1ebcebc824062ac4b2c76681b2c50ded752ce8b6fd479214d208b37468e8a245a39beb1a50bbd107163238ebef1a7175f89cf09a62fa52113c85d7ab9aae4b2870bd2d9b6cb554e94ebab89f828819370c8851fc38f2dace674fdc30d01ee7bdcd92cf8fcaea49238d0b898fbcabf9b9e833509693779754e84e313c91dbc9d0a3275b3b04821bec1f8bb14838fdb4229fe23017b90b76ed76741c02072f6945d4dac0f5a4f5a31de633d136118ed41792f0344d872dd0aea3a6b2ec8a5a6bd410227a4bd90395b08a61d3b129782abffcf529d3cde8d34b51b298938479f0bd8fffb99d32d25b9c72a0c2e95d9480f837f2282a81ebcb6fc965b3cebb8f8ee7be0320b199764605c837f5eab41a4a28c3d08f8e02c5de917a773bf6553f0d4f7f1668c8dcc91a085f2419fb93abbd63661ce063868e1500d097a4eb45f2345a9dbe730f8c43943522be974f4bf8fc9eaa3f55e22c8af72b963419002ce45356095f295fe76f2130c88fc02f3de8b3a6712b04e0c761938884b2a30ec741089a56773b9f36da232558606e841ace2f16d435cf56982e71a9ed5dec84bb5752c15151e03ef507f963494b7789dc47efaf831b5298c5172627a98f69af821f640a43f414f9ed133b2709e70ecc39035557ef6ba3da1bbb76f2ac3addfdff22c1f07ec2c7eb3e7536c0211f720a0837e569e9503b0efedb703ceacd769539ad5f377ca60e564b9e8c8e248c2d68d2ce1dc227d11e1a4cea5e18d84bf0c4ca508368f026612534bf78b9dc63321ef0e2b3267ce66bd0e1f91b5a9f0e429dcb97ae7aee619ece1135fb051761b2a9ae953950c10926389159114a5b4f02809252d31b5b960789e8574fa9e30cc5dbc52ad1d872f20626978983f3398c043907d03e57325c35559ca868b9babdae821948c6f1374711ae8988fb6fbb201bf93255f69fc401c12c0bfd07b054a5ed7f1cd48e6f49a35e1931dfc650a3158c57a8c405bd3252ab1d830e3ab333230f164b7bd94c3da49aa861847823753b1390a802e3f88f4a96b85c3797868e5d7316fba34551d2beea70e6a552bd443d218929618dba34aa45d00491e96660cbf398240dc4f237b0e385842c4d3034d768a7b34e922de4921ce72dd2aae87aabfd2a4cf500805e29fa3f1e080aca6c7506b698e19033163673aeb34d958dfb51e790224c9fd67d069c20a9dca5b46adb206e393d7ce763e1bacfbee76ee9825139b6aadc7b96ebeb240a4fc6e8ca212f031b0ad27a40eedbbae2efb181e3274377a7d4c543947422bfcbe3a1a939515fa8e4845da364afaa469df22dce1e2e427f57f22ef490df29e3fda70318adf47da61a53602a97be7303358853009ee06334ba305c6a76d83733628f1696bf65d621d66744162fc37933c18294a9c093d3cf3e6ec719b83e4e912ed6cde184d46ae23e6e4e74a6b3c2fdef78d018ac08bbc6fdd1190100d587331ae72ac992e5ca6b75b7880808f64caad0a8bf43471733a3a1ab18967189986c3892a4c547135899fc4d0ef58f43160538a454d82be9ee7f0eee7e4b79935145627a337a705b71f7113d81840c7c7b6cd7cf366aca409844032c470f94c8720c07ba1cf037357315f4173e356bcd5d1058c9c880c52d634df3fdcdf8e7275abcacdc0b0c20e169e1334f7330220612e0c0f1deb6c0ab04095779cdae647dd5e2e7f70378296d20d301aac54a5026d6a3dc44f6bd0bbaca596b4525489d89c4999acf1c563a1ae49c3c9a6eb3acc31d9cc00ae7d0417d14684b2f2e454d76d517cd5a7df454e0afdd01845566edba0f7aad2bee8e462ac1d9ff02fcadce4a01dc2fbf3f30bbb185036fc1d6c6435370a4b62921de0cb5f4d0a6f190d445bd80f51c5510d2c8823ad44bb49f1125bc2050c8603a2b43a4966f859f9260c84e3d86fbee07021c690b67a8606c287023e9314a0463a9db3c4f0a2b2ef283cbbd6000e0f40c769fa1b93ff751ce64e436e55929da54f56ad322ad62e917be8385c78c2e60c492fd3a3419d6e59e011f2d9af96fea61990772d8fa138fdf59ad3892339aada793119bdb723294f6b5025628a5a1cf55ecfa7a96d77dee166c263b4ae0f3932db0ee3acdd5644dbf76377944a7795c40ff7d8d829c7101ddf327cf82d97071b42121a125f8ec98c292e4f7cd6309fb189c22a76ff7cf3088e646079dfd21a0348c82b3c0dc3d6f2d846c314d475482bfce112ee63f33bc2c4d9e8a96d323dcbfe143e2e7db37fb07c097bee15287a10ee1669c41693312de474f645d4f278641bf0fbe86c4ddd41439149b3c1d0fcbf6a30ad8200948b1617cfe0766f42864ddf68fa5a7c4c1a3370b7a085830a99047438dc3455aeb0ff83ffe8c931dfbceafac18c37d2eea71dea701a99af0307338e08cdbb933084521179460630d73a364e1e47979fa379503dbc6289569f2d10871d3b9dfde9e89948b7d7452205fcecf8d127d909afeac138239834ba3aacc13f2ee4178b1d32236a69d8225f183745861e0e77eb5dbf441fff93ab053db4f2874cc25ba8d72aa372700cadab56a1d634209437a61a2947ad91d1cab6a32285d30474d0d3c1152a7cb1e20cae80670d8f9e905cb22c9a26fc910bc1756ee1bbcf16e584b22fa663045377cd6aead05a563c2166942ed8889bbf14eeefa6b161487d9d18875d7da81d28326676bdc3f0cb2648fdb8fcb1f77b4d07eac2d2d4a42dabc84865eb652877cb90b0d7495ca730fc5b8a7911f7a111dfc1edd5b8e25f9f340af32f2be8cd2a6e53f3086de4775555998435193747da13b8da1ad01d74d402e338395293a18cf992629766e0f47a8138ce9d7206cfe88b252dd8c0ab4b42a60451af384065aa717f11f7a046f5f112d126b4f97713345c4387b95ebe51d6fe4c9e18245ab4dff288b7e5af172e24a109797ed12695f498d39608c74b00a5dcc902af85fb900a11467fdaf0d6fd93b6b05227179d0d8ef4452d84434476056876ba23c34a7958798939587d8a23cdea2845137cbbd09253d04dfe099c591c80b320e3883767ecfb39f4c00aaafa2a74b9aadb5e5056eee03d06dcbee9c0d2de14acf1f3bf76d163f6751d009dd3b86bd945fce49ce131f3baa5d852594abe99c1711daa3edc16082496e04e1cfd509a1d77400d6c2b5f732215c3052d4fa802d79918c0304f17bb89271ca01dfdddce5c5f85548503592d7f166d316a542d57b68e7d4e7289ced055560c95aaa50dcfddd64057562bd5c40a2e14ffd4d4febecd6457394c888d7b62735ef4940d6f1d95eb4191759871417cdf5712c09e4b5f3f0763676a6e4cccddf59b04b443d2ccb6d3b1994734b3a24600b986b2152c78ce3c70593a08776616a545bc89cb9513df6217e3076979ec258f760d6f11709045d01c3d1f2e419e017ba39fe0d079b1b85a3a0ccfe5f8bdc6f097e2907efe9f458c6cf188cc07d1edeb8643cb785e633ac7d98b1abc08dc246ce3febb6de99ef08b74a348a035a8c0258fa8acb087df0056a0f633d99b2bf6143d91b0657aedb2a5d4beb68a5391da98d287f5f875f1008f96c9b7ab9d1ea64cf9f1454ba8a517c24bea7cfdcfe9de565fcad89b5189e12fa074f0836990bd2a0eeef549da17c20d022824809a29b7129cf9762a299743037e8f80279c45557d447c68680f5256cf3dd433029104a4134637063a1f842edc7a693653fa72fab5b64750f7ead71e650bf2fff1a532b33da1ff7ca328fd9e8236e76d6f65baeed003040d5fc9e1b1f8867198e65c02a40a3f8d3b94b37a0ac4a242d314c614350942efa085ad43b367df369ddaf63f3da0e16ee02435aff26ca40afe17c04dfe712fcbbad1e1d51d5e8a2305723592157cea6e22895812e303073073dbf405f6be2f2b02c9313a00e4ded85d1fd5d51fb71ee88bdada34988d032414a56a9197b757bb47c7d7899df1835540890f9393c34c97c4feb781eb13a7e8ccaef0898eb6a8b915973412fbfedade50068b8e279e792bec45e3f88e021a6f5383f4bc3e7b17c9481f2c01315bc3afde98e2266c711e617945376cb2db23c3d88d2f101a1244b08c3492d613ab2becf3042350c8064b60ed5dc6c7ae5ebc611dd5b6af61c83c76d47a62f662f5bc8270faeac82e4dc497117c7d5ecdf38afb0a0928d8e1fb1dff2c87f3f2826e2b0cb120e0a40ad10ef733725263176501266a507c3c40f62793840d9c03eb62c6df13757dd7f2442eb99650e4c1373441918c7e5f5b218c8a5a7f93199de30041275eb47af6809a5e0ffc7c7be9943af0aebd56dd9bc6b699ae668a7a1fc1057f8cf11c76577c1efb2334a62a1151767d9d114865330077c20705ad9ca70d5fb7ef880156b1af1e5e55699c7635699bf40db8ec3181a2642f29906633969d63c1d1f9a715cf5510020dc2bd102d91c7257b5b7bb68872666263ad22ea4f2efec59fc0a8760d677adc1d4bddbd7305b31f1b705d95e17ad7f540aac77588d4b186e1e2b7ff6ec1fdc1b3a0fe12a5f9e1843daa0c3f3f4572ca2d0021cfd42e0bc8bdfd9b0dccec2733243a4c0b22cffcd86160ac92db5ac0185fee1d4a70c9225701180f83307ae1f6a336ac0b3b86214a334e78306ca8f5483b185f3196b9bea6da78e9800366601ac5ee330d24618543143c25c9af00c389fe95a9bf2e5174718d88b3951a3ca7257ad39b396c8c65107da3b26975c9ace9b5f4157b476fdb99821047da7bb0eae5e5905dbf80ab14902acb7d064d70de4a611f9ad776194774522d8dc15138c14dbb046b9acc24a087d5766438ad86accc49d49946ae1f141d65046a0f4a4cbefe266164a3d562d6e6924db13205c40f33f1b480f0b872e0917021fbebbc7ff403e1858ec0048bef20da65d7743de9d9c709d3cd004400bd9063d58c33acb163d44472388e81af51cea14b2dac28de30d8bf58cc221ecdfae9cc6683fc5be1a52105bdb4e4f8cf868475d7cebee5f8b758cb1e99a36d3142a4ba2e38405eb96d8d5ab896beff8943b9b0e3a0c262ff835f464ce22590928c92f5351cc9d3810ebabc71e70dd793539adbde04f0d511633aa9876f9e25ce534423f320895cb9f7658005d9d7b27cb16d260170a2fb073b446578aafaa280ec3cefdf457386e7ceed47dd9a846cb10af631a80a298708d270b3457e8a5bd2a32c79f1ecbbb5cb82cf00f0ffaa97249cb22eae699e0fc20ec503d4fe0cb03519c66f93a463e12423659d8e2bb6595467ee495c537d8e21af1e9448b9245d684cc01a827aa6c94eebe689c6e3fa910c2538ecde8c15a51314c781665d87bd7f75f08f49c23b14a2bb4d249d154028d1ed165929fb657732d7e5cbcd323cb9a95667662dd63d80e3b96bf8ca313e9c4fb67f4ec76e7886d0839a8e7c886aec0a5101b74cf16cae8a32a79a925804f58c6beef2a1c7f72394996da8d9bb58d6f9eb55b2ea62356ab70706715692ab24461987939b238d325102337edf376f9071228be6108274085c2100339886ce5c28c3017814a9f5734a70cd83f19dc8d6e022987ee53d24652f2d4d434e7fea17c1e221cf2b5b618561b537c3166b471a73be1fc37688e54ffaa7f35660947eb7c5c64491ec99f1d3c06e84843866a2d0a1c8b91bd71ea4b6506f6a22ffe28649fdef21367eba272d751a35bb220d9219a6298b3c56eed66163113b29e50a33ea9366073e417cc80023d6ac02a58dcdb208625d385415b8e46c35b86b5a8d37c7a9c930cc3da114265aaac23ec5ca753f59e01955dbfa1a2ae9a4c80cc60a091a3dd9f24ce5f9194bdf63f2ff67b576d2f0763754769e22d9c8b59f2a5cbeb4285c7d602c80a9472d220fd3250af900dc67ebd3b5ccdc82479fdf5cec159e37f9d42ad36f86d2e5738cbc684d15be1661e9bab83695de7c7681042d3f6afe745c297afe7683d51336c869d6d4b3eda4b96a050515f0b5b71b7dc7353d9ced1ec3cce1e420331984ed8a3f0d6c005b36ffa401b524d65f20d9a2adb5611ebcd253da97f9612600a6ac88c122b0a18a3e58ec2a6913233a70f3af441a25bbcda4b6b6585839a6f5fe996f29140f27f1bb690459d59ae2a45dec2388733b2d5be62119f7acba8bd2a4da948aca01247eeb9f1369e4b247e46a621241348922c05b816492ccf8e1f0a02d3eb1252e6a4dc8898f2e683c0f210dbc062d878f15a7dd48bf06cf6050db1555b1ae816d5d98775d7ec4e48d03bd2a2ae78d089d5649964f92e7399b23446253cb396dd974808b414ad6e21f60f3816fa63356faa61ab4a3ccd7ad5afe8d011110efac06fbc3d46e477f2de9d8b840cb3dcfdb2c665e11ebd3f198a1387ee7091db14515750c7e8fe558c7f5a3a722e00f8b73a6f2cfb75fc2a579c9cdccd26a4a7031a6fee792b2767215de9f4b66d5dad505712f8ca1ff3a0efa946e85bfd1a8e708319102e81875d51ccfc28b44f941638075a3a6a8802f48eac134d4771d5ba70caba2cf2b87ead31284d93088f44afeacc9e3aac8e98f35a0626d6f12e07c48fc5796b4da01abf0ce23e6b851043f79da0b389d375bef976ca9b8d7213092b32f2d1ce359e6ab1c3e247509c0818b6a19dbfb95602027ae91222e18e485d5a9cbce67cb88f030ac3c15963e6f4cf8934634e37e9ac81b3d23c7187a3f61d39933bdb01ceca419032c23f82066cac6af1a09c4afeb31eba8acae9320e562da11f4e526673a79d6a7a7647dbbc587e97a9e5ab3ac0553bab9c74dc8881bae9c77d888640931a0197bdc0fa74a42546e77af9ca57343bc2d74e999b4b2812f3fb0aab85ed4460c054023eb4926a03d98de25a51fafc5b4f95af64fe84679ce384ecf81d1daa54c82e46dc12154ae1acb11092b687423061fe33538847fdd10b56cae4e532203b513f848c49cdd62c225976eb7253b6a905a042a7419e552c12d548802fcf4063bb5c4324f4e16c344b906ef5d88030573dd57d7caf61ae4540c556b3d5ae634738a0b61d807997af7c60933ed8ec34ded82fca41e05366cadfd1ec1b081ac082af7837a32e82537458f5b2849658d65ababe9647cfe0e761778471d77a23c0c6af6d036af6cbd4acdefe3ae4b2fbcb7cd601042cba9df0e90c0565313da3eed502a9cd8284149f8c2e2f3727fa319adfd78c6d5da9ca95b53441b7eab5f7ae18b3c5a5dc251f47ebfff1add111770bf19fe9de15c69312fbeeedef39ab19e3eab0dc04f9af70a278859abf4c251883968f2fcad3a8ef3bff88afcb80812fb27997934c2d483eb55b7e6badddedaf4213dc30e8db7495cae0baa2ec8ffb90d53e06677d3ec005dde9325aec92ca8a5753584a0866624c5331fecc6b2912cb48bef47f0dbb0fb7f0e2e52b91e4fe822cfc4a82b6ece48197af73fc361c9a168c5f8dd50208bd7573aab26d829fa4db908f7c1642d32090956caf9be88452cbe7410c8e90eda86be9002819123180d025c331887f265c750432076bab11616b7ade7799d25d809182b0624078a37917507088e4d64f1a280abcb5c15b1229b90bdc601a4e9cefb037422025e24435a4babcd34e808f0e3375658d0f400047851e996c0a5025e172fb818388c39a746b7f1f964d40e172213b8c4ff323459cc822953e4ce0b5585d0482d703a985d7c56b8550e63ce7687051a946890733cb22000267ee7f9d7ddea9947eacfd3e8ae7fc24d3a5cc6bb33792c16e1f52f9a074ef2f819f162a7bbd2dfff30f6f11a0550baaad37c296030d990c49a01077271ecd7e2bdf1ef0babaadc9f8ead7a86040cf820fc08c53970291968ffafda26ef53f5bdbcf3b47c48cd4e10d0e81c114931325268a0b405f46a139c58edcf7dfe4176e73f7a60f9fe4248092aaaa83fd963a42fe41ebb2b0f75c52924e6b70ce39a9fff8c08804d16d9c63a26855e16b0013b68b06621e8dc711aec6920d6c77f67b5a29d6a9774ae2e04463c7e3f2fc12f1f4aa60370ac3e26c0796f8c9f13e533081c953dfd50611ad69ab771b1d8727980a21abaa9a7ffe0238c49eee5f8d75de1f4af6c251f6a05c419af46a28aac723afec45f4363080ca98726dd698586ed2bcf0e89f7bec55b0186c2d6b7802340b7e5f4c72cf09b7acb6afce8fe03152dea34df9551ad4b8691767f78e0e26693299af14aa838675ab686cd57ad349358ec5f97cff4c5974ebc3e16c9dc83cb64897a5e425ad8417cec3bd6827949c5d42079424350b08403996555773cb89fce061e12ad48a813793987cc8b7349a89e5b828005a993834920ec014ee005c6eb926163ba3b8a576da4bff9afcb8ad524110452be40a7a76c749c7e8c38e3c9dc9bce2990cf5fc5f14e7b01ed9555e66e1798e7cbdc7ac46a2ce480fac33189ed3c9669f92ea0d10ce632b069944d68304082460488a4ab730226eb6e314044832a16dcb85c0957c15e940daf4b1adc9608faa4c7be5b92c025e1145f85af3c78e690a41da119d27e1f01b8f73084024d949cb4001db1c1e3a83ba495467a5ace82f897ad0bd8b2661afa07f3b5920267baa881ea21852301a2a055a1405cb455a626bc5d8a283ec3659e344664e3d2be5ca26cc0ea15ab217c1d31c89d7f99807ef3f66ca4818914c734675ce9ada476b1c31001b8f453f018c83547117856a1bf588a453e1abd9cb2209cdc74d059bca94e5517368457a57d74a815c014bc087679a406c43412ba09cc894e0a37253fc3da498a8acea20dfb7825a92d6fb98b9dfbb7a3f7ebef8a9351ca3707a6cb28ecc99eea47457a97460db80f7f444ea499f1e868ec6516c5606c46c135b1a7fa25c880742d0b375c079a134cde0c4afce0affd1573fc815339946eb4736be344947ccda16d0234a819d7736acfa3fd83efae565da81c91e570f1298a8d1ed83cc23264bdcd76de7680ca41a97d61053d667e07c54e2a92cc89c87ebf26c649df25b4b0b31c508340492875ecc6872389a3516a98b08590768b790630ccb3ad83b45e894719f0071a8b47ad473e5040ce11a20eb83a204e0a76e620e27ca4d1420056277f0ad6697adbc8e9785f4034e2360791aff0780044e053f7215e86e8dc81b9bdf5b64837ac205e43c606a9052b5ed58891339e47dc95c70399f3d50e150e1e0061367a351077959fab3ccd925d895084da749eb21e573fbc839a546960a8ebaf281094d28a62def97fa5ff8d43c94f5850d4f3fd85d80988a8a2c57a6194c77bd98f3866ae37ba8e31e5fc5820dbfe76fb423f0f1bdbc94007b838d43e0536b3df01538f940b5b605bcad2a103529eebc1c625373d0b8e798cc45af80d370a46c520e1ebb7ae9d28036e633e3070c9d252cceecfa3410220a670c9d5b82657518749726839b2300e4dab26812f7c4c0b9420cc562214923a62da41b7fb76938d303e5d21f0abcc87603e30fa7769bcb3b2a7499acf180f0f4d5b32fe9185a2c77bc59c9a7d62121c95a1f80767d078256176405cffe087bb2d73ab20b6ef6fd74185868e60a4cb0f14124977cd6d98633f7bf417e7301371147b968a3bacdf68ba5ecb432f93ff557d97565de0d94df2735d234edb57ec2c03b6ca3f511e12d9e31e7601f8fefeb3b6175b51185d4b6b72c57fc2fa0002f195d8b12545e97ae8bd41bcd7562894d8c04c07dc6d2fed9e9f451819ef01521d950c72ccc7cbd31218cdfd813fd81eda58980f56d8bc351fb9c2a234254c1c519b6e52a7d3ad3d6b3f540197e87bb46def496e4cc4677cb5faa4db57d92bdbba9c6b83624362e009d80bfe42d6ec553cb8c3df7e1e7a7e58db5ad029aab9298bae278810202c1a6fd0032b89e4f88efbd5d57fbba2e2ef3b7801561325f66842e8484e7bbcc559bf3f517d5be7478dcffa7db47a3258fd271161d3910546c4ae8bb9e38c772395176e15e56ef3b01a8cd154af78c1423e8f59335f1024838a21b4038033df9a9642a9bc95cf6f3a9bb233adbbf69e26a6a30d81655296c00197a68c25705f365dada1ecfa8f3a90a0ad2e636b0faf956e545c5bf3da2e95e5177215b5678558df16af3417a37ccefad1c3949ab596172423e60bca83594960c67d1e1270eba0370faff129516cdfdb4e3798c77283d12339ad7f631c73b1bbbb26281dac51fb1a5cb64d337063358b37856e0d86b4e24da2d0fd423c4d6465e20113bcedb629c04379bc4588d748e12cfa1165b980e9fe6c3cbfd2cfcbe618346c9faa37e1fa347784ea698fc55605b6ed0eca7ef808d0eedf0ba89f707a81efa93b35b0f0c5e52e666e83c43cd1ce25edbcb45af633d747bfb7afb48702bf67e7035340fd640ab954f5cddc7236a01fc3ac0be80357bff7b9e91895aff7f5c826dfce72e50dfee829930fc5f762cf16a9f003f2def7999d289504e2c04d02b429c4eda6bb8efd28b2289f236d2eeb62afc8729540d24a5373d283f3fa69fbfe888dd4ebd4a8f108415d0dc28258fc16ded96f2bce370baad52eb424516ed17126e8bd0c5cfdbae07a6a56b944078a7c082d048bdc3f9ab9a1cf672371b6532144f83bd45287f5666fcd7f82146c3fbe7a106994aaec487a051cf16ad5f49a7d9b4cb93966be553ec13d56ba4a7f54087edaeb6e9e5eaf2e1b604143baa111a12171700ee0d812a9f9de4e7f8bc6b73ab389ba532a6e1ec18837982d7e655d7d4c76cdd48711a3a74beb4193ad15fe953c67bff623ed9f82baaa08f2d3db7888681128c7ad5d16ff49364400dc3cc6ef46db5900cae3350f49fd24140cbb105bd08d7d7a15730f08b30e04f792dadad409d93daee8f91d565b1138c3a7f8509f662ffc512fd715f40f09a1f22e961c2fac448372127a4cfe89a6afa48283efa3a30449ce612be4ad97cfbeeeb4f11c00d491f76ca1ca51163c6e44844f2a1efc91bd9589e3bc5549eeb972e3f26c8816b6deadd1ec77aadc723951d9cb7433bddc8d815535e2fcf86c2e6d5d4ab042d11562be3c0b8af703bd2559ca6c063b7a309c873d69b8ba667c4fd0a57845d896102ef825f02e7be2a73c1a9ce4f1a8b84d6f76717ceab2987dcec070765f92588eb22f4dbe857ddf661dba0c7ac54a6a34e69ea1f05764246c243ace49d8916697339020d07e4cf60bf2d6b47b5e2c702b7b8b49c5b0119b7ecdc261e6dae1fd1785e874aeecbacfbf62c38bf95141c1d75d1a3a13f2b3724c29eeabf94718134b7117ffa8efcfcedd289e50e9235e420e7ab6697f10637592996ca606529a9994a6f628c6fbc80d439bb17e3cb7a645c5c238b3fb9ff3043fdb92b2b33b8ccdc50353d55c2e0fc91b71ad6c4cee6b10a38aca8179dd7fec397ffcd331c88b11964bb84f8c418cd1262052becb1b2169bad36e1b39c56a726d13df9ed2f68243a83427647d03725c35e373415bcb661d8e4b034aade694ebb026bf2f0824af22c9b704205dc565b8b46e39956410dd2da448eb960b13c33f1cbdd8048ccfcdc8451f553d00a0867f84ae68f46f5a79b3d7074171f9e22846d55a72627b3298dff9e6cfb6b8e4719ad316fb40c644572d73e4596f85519406ba01f670a0f8e67e2897543d27b2756e1d541cc18672d081257339c55dbfef180522297b8db013a51e677a814db420ac72b7ad786216ad6b2711200c9bd6037b1b47924459168bb01e027121ac19f64e15779e39ab03daf3fdc15483ac71221fd3bd63db03691d175427fcddfcc5dc0892e9237e57216b2e16e01a197b71ef23a1e50f07b0e81bf6fbb24010e58bdba7e0b2982fc8f1f313013dbe0a20d34d6016a7c765aee3e11cfc3c1df0c258c2062501ff8ba43be18baf4a0c3a0359bdd1e622cc8346a6e2f2906384f620031781647588450ac74afd64cd5dbef6bb0602ce5454e13948f089e1cf2d329f74c5cf82f0f6565323ebe64e6f574ba16a7cef699386719f599ce6dfa33218f50330fb23740d7135ea631b64c73944958cd6e2935722659918d867b4b5930a44aab6fa0bdbd7a4d9b9203f20aab040315f509e7a341894534414c4f00f86cef956a6c3deded28c969ad8630d393d8414608b427804239881c316266514c1fd737b3f0048720e4dff62ab2b920a917bed5f3b6ea1ff9029d1f2bbffd50d08e115447e32bf53634cbe572de0b933663bb0d88f1b8273644b6a55bfb91754131a39309c68d1c314145319f485a6c6be96cd4144fb8521d530532f4d78d76799997b8f2be4f239e0979e67109dc6ff7ebebc8b75849443145a3b8c0bf3328b31dac269173ce64196afaca0657fd5e51ada18345f75f5411fff7b0345b49d5390b5100622315ea228ea827c87402ecb393e2cb9434cb9fc799a4102b3a93aba0539e51b0b5a91fb4b92bf13cbaf6ff5268cec6cf08c547d3e52d772991925ef606925a3fa23b47575dfd8ab7187a94a7e0c208e5c60c4d54f73857d1901fb6176643789cea89794c5a90a52443b999fda1fbc6294452371ed9bfd1307ca920c8bdf300d0cae254f77f3407e5ee211f519a3b818bf9a7a5197bc634a074ce22b541355a627a59221ad104e4448bc7a6bd8c08b5c4f7026359f177d703148ada3a4bb5caa4ad7e5a8a02d51be5e6359f281140a6ab3ccc90141917fba5e0b50060f644a983256362c73dc4b2fa00c30f09651ad0fca2ee4aea745938ebd62bbf2d5dc32da3a8577f4cdc33b5c8ef5feaa8d930eced709532a266e91646f17a4b3c25a41433aa7c2414183618b0017769879fbf4ec1ddaafe5dc85dab09dad7f9c27c601b13b737c4bd49175c258e8887c3b01d4a29363b63ae615387591512bdb63730f508980d5d247845ee8987ec934a60bf10d6b62ffbaf95fc2e3b9f8f12da91ec9735da020fb16c7551d522775434dbd3e80ac86e33de4ca3754424ff197c413f95edc9e784dde2e573bad158520b06873e0e89fa9b5ba2fd3656aaed13c694b3ccb5c98e234829e79299cc3533e1f921b9818ecd675d2711f0dbe347161d49658889d721f2d4d00e8ad9a183fb642bf3cd9b3b5c99b78dd320ae8b760440acf814a789cf1f9c3fb5e871463297a89a31e76d6c0a64c2520f388d5665c9843082339b3c94334c2c4d6a102361623717ee5b7c7ceebd69c7d106c7e32a3a7733c650c28041c46948925402f72939a773ffa612731b49c4a4f94bb77f63b19314c08f6d3f105df256892bfb6c01d64198f2d529d437c4e6c89871191d338ce6d8c26fc68fc5d4b4cb9728e9329ee17ba958abaffb21d5f4dee3aef367817d5ac726038a460fc581cbd76a9dceb9970a3e5a256bfa174c8c063ab713da977fc85e7f242897f336f5fc58118a0044dab5b25aed1108009d0d07fb281f42ecfdf1d4fa027463e3c4d6812ef7defcf298a058caf182218c4b6eab14af0f97d4494ca9765647f45d777abc6227bc763233804952bd1ba9fd19110416b8fcfc107cd35e64d694ebb68477977df52ec2e59dead4d73d6067dcb84c6427f35ad523c2687bc16180efefb5eb3e7acb178af2239f9214b2f3a0db2c48b2718e2a3eb656877aa1a35e69e26826085ac23b075a0c9ac401adf00271c2c4db6cd01d75a73dfbe5bd267fa6084bed2ce148829086bb1ca627844d718e23ad02769103b12c616debb47c62d7cfdf1f0c3b192d7bff452d78114f39b5a9be26d553207fa07c7fde4b3352cd69473bc4c1f4b43ef06dd1d0776f55ea488392dcf22a83b119131f6ca25990b71317b2097269d04a969721d9c5cd04cae297b2118a06632cce067ee9effeb8bb79b65a2e442ecf8057f9df5fc3d784e0429fb91a67f2c8d29989f8c84416088699dd354308a6a08532300265f507e665624313bb899849d865d902d7405d6114925aa1985afef194eec097fe6c495c9cdd89a733ce6f29569d9f42c097b6bc4cb2c0675bfeaaf2d46cc66ee0c9521f0f58dea4ca2530e818a0d0ee4d2d07acea9445bdef02458cf37ee7ee55ea4129a36e637213ce33b93baccafdfed2f6fa148f45e77c4f6689982ceac3d55d91c6ef8e2184840857e288913d8269fdf78e8e5a139c04bff14e8c8186ce08c1106d36f53e3e045d431dd1727d54baa2e735e5b02d486e641b03b64ffa9eb8c55df98be8e90c80fd115d47cc03f1f8ffd9475acaa8298de8e49431e66510bd34055aa2c2c63260590b32aa17c7b22dcef8001ce37985b562798cc917644fbb232127008736da3d4e20c5f3622021e76ff78c5a492719a4da816746db0e896ba231ef9290ddc94cacf9fe9979280d3174c29150fa54f463a5e61b9f88c12f9c2354c26639cbd17b62b797eef4d999bd55aff6fab5dd464c381a6fbb0e3ebbb3145a6804b74c822206f590522741405a174bc21993245eb08e994b443dd06a900395ea9aefab8ea9fdcd90b85e83723e86f0e020d1e6478cdeda92f9e2adc8567babf780f01cd87771801ec433bf72b3c5f780134f411b6af5a5c5ae583d9a0ad22734a763d3ca5ae4f52ec4e2a1588a7d41b0c15bb80818cc064ed93711316a0a4f130cf478defed1096444ae56335bf096c2c3fa0e8b04551d4a2317e9a8398d24d248a0864677dfe62a95ec36d0e204b3e83a1849405ca71e7b5c8a8409e7b464b26ef20b38a3ab4dae355d49f8796a6aed6948eb0c1d6b7c8a56935877d118f9a2d3e0a36f5c666ec8a519819973a23bdb6c337f0eda22133cda2f074f9ec54c05593dd998cfd481f2c5941115fc10857f0a6f58d4ed11089a8f22cf4faca373d8af934a581d1fa7efd8d370a0f246bfe29d6b47077d44e0a1fd7ebd644b90960038ff76a06ccdc6e333cac0fae55e28868bc6bdfbeabd0e839dac12155cf4efaafe76b154d99eaed17279562c7d01cc4bb3ed5b4009b16e9d4bbfa686b61c34314ee2d03c1060be9ee016c98b2f6188cd6d20908d8ef02f95e5cb6c6f046c5dddc7f23802d85762eebca06ca44b20c30a8275e8e4ba92d3ac6a908aff96300e4fc12324da3d6e045647507c7cf9c0fbbf8d171b8921984f7f94aa6e072c8ec50db02f8b5b5518ae16921e457646c92906865d7668d1d5e337d019593ccc94c93c62a31dbc4cfae8069f0a40eeaf8641964e80577e63514bc8cdd42d8cb83df0180fe828a581d70fa213a72ff0b46f34c4c2f487ae0e032b3778aa030cd44719262c693cc26a24ecdf96d7187ac9eb8790c60645c2e8772d81f17276741f4fc62d3dd858d002e05d50aaeefc7c2ca8c6f94e12c561e362d9e31f52d3e62012ec672b6f6c053dd74226ebcf21e50db6fc6503252a6d1aeaf3a8719ddf1006db6919bd89f9180f1f0ef3d9a54e2024fbfc611d091d93087e1d1146ea3a777672556a7e663033d9afb1988f1bf9056ce7f0cf9b793b3d9643bcdd8d6891e68738d408b405e61a6a3afc841dfaddb9f7c3518907beaa9fa07252c12e8bc68f037bab71a71c93fe38c7f0791416fa4b41807d0354abe36a536b763481230438931448b08849c8fb29b10f711617cca6e7131b5960fae43610fe5156356c2ef119ae1218b57653e4147ccbd050fa4376bf00227569ab7816e48d51b6fe9e16a73005e0e0ce9faf15976a79f3160288728494bec08c96bd35e10b8adc736a2ea91fa081669c887ae2818b52b2c69003c62ceff589c27266d94a1e794fa5a9337d75a3b7256489d5973ae1de37633288c46e2f51e4e07b75e3c50d92acafebcaab2514a6eae7ce6de721a75f9f8a9d06b77942be0957c9b649f5484d0d482592af11a1193fb27bb54bae44d29ce456f3c158000641295483750a99c0e25f8a59d2265591198b4fc182e713610f619b2011afc6863de790014e911c646b09af06908b4fc03e26897620d857c1bd950da00df99ec3c5d7a3d2ea836920941b841ef925ac20db88ec46494ebf14f3748ae275ca32a4a8663bef35b9f7a4abf9ba27001b784c85187757c501cc83f0b13f8cb63d719c3f71260e0266d33337c7438f40a084acceb8b54c3f1cf0ad9e83a36ad3185475546b143678e5acc2cb6cc9acd81d460621f30f34d10e36fe1026ce13fd590d348d3baa4cbe0e5863dfa9e9b69804345c9fbd495b88c4226e3d8b9c57e753ec1de4fdad30415a0b8a7ef25e8336ca65b9d968b3dee421476f28dc7a1aa0660e061c64dce8d036a1fd442ac366fa9cb119c3cb226c8284198d9a97adba8ede12b6be2298e2c9f10434a7f9ac02a6840530f49427d3dafe42b4e386f2a473788c0f6bb751b71c6485354f1636f42736dda787cbcdbe3d158fed4e8ef93e06bc7735388a237bf6bba170337f4b09f5f175b45bb50a2a17fdba60c8c2e3f57880887ba1310bd1bb2087f11523b5682fca763224793a1127b37654594f93ea7663cbee0db9aceb5d2d7e56e2fab2a484713a7d2acacf084ae5b18d13b5a0405bd83fbb6fcd6b16195e5ffdecae3d6543f349fe031cdacfe428785b89d2325c4b2cc304e9267a7f4c945f0ed1a7aa457797d552aa6d788fb1ccbcce510ef624b026cfff8c5bdf9d1902aa9714d21ff790442d237a963a6413c214d96086a397d529fe95fa3f4116319016c62d865248dfa3750dae8c8080046150a3bf4500538be9421e88ce4a61d9133b500d1919a1b61481bbc1e77cad5561372229a609f84c374d2ec0dc5f32c8c6e6623cd8e8db545c5d90b0884bb6531a2cb0e1deaf5cb9cc77a39bebb658bb3452157a67c97480b850c6a22aa72cba12e2359622c3b361ce9e4c09c84c24a480e40a6fdd6e8d1022949766fa0fe63a1c3261db6ddd386ec725d2d356a9f4b2329a5d86ddecb05bc424b4d3e7152027d5d250af1c3af392c59f796f292add26c76bb012dd61730cdfc991bd9e62a99c3d41ed8285027d5ddc0d29bdce93e1756e9f783b1abbce31f63ce1e28b80a0ab5ff0babdd2e61d409d78aa5f24e2f8727c35e4835a3d3bac09768e53339ad9da53fe5441c9ee49acbbb15a0b5bbcc1da1ffbcf961dd8372de1a32b874c9d3e931072643c7733ca07b42aae209ed04cd3f75e7b4cfd0d0494fd5100e9f348e1b6e25480f9ea8377a977131bb3496b05b7674ed4aa9de145e0cefd6c37b3bf81470de945ac7d0c3ced0cc7cc7df3e1c3813f48315bcd16fafa4f662607c786894a247e2299691b75499757cd119a6606a1eb9c75e11677d329d47b7197dd80c1e27ca353106ad35540d44fc5e5efc8d050afd6f77464845ace18f7c3f2994a52909d1bb50fa6b7e7e6c8bdd75b6a89cfd70a9424d8352986fe984937f47cc6ded726fbb33ddb6b07a661b1acaf5d91a9fefb4ddd68fb483a109a8b8bc729e4c710fac7cfc6b5a678686f1e6fa4ddb2d76e3952dffbfc0f55d1721e5bc773db7e9e96ee4cde8c32886dedd12f7756e9b6413db797365c6ec40e34e795445b02e40ee8d0cef1f084e22e83934b403b097a71dda882175c33531b2e74c19843c97f77080afe29aae16d2f22dd863a821588a4826de66eb61ec2517ec889b3ea913724b85171d765b55332476e270266fa4f503096bafb82347fc1a72808456d50c910de9c7e448063219f9188075d4e263bf644921dcae9ef541d919ae1f09d0c72e342e56d1a3827e6196c54f18c3ebdfee384a78b926e33c80a7b6024c15b50c3dc097c6f82b56d985e146b1c9eae618911618472812a9bb6dbcb168583c48dc98fd14bfcf993feeaffb003faa4e2071b8e7cbaea9d3838b35831f0cc0e17775f04a016e5550e796d31ee9bcc2a5b6550ed3e1f19678a5a647e9acfc3aaf7f7851641e8756a2c69bf5186ef36ca2743856044cd54193f3c20eba501f68edb04e3de6021ea4bf595d01edc78801d4505a38f72d7911bf1e21f5ed24e54d2c7c0b8a926f69a6d927026767c1ce9288437753e8333ae6ee46a5a508348582a4b48b131b4c190958f09ddf6e4b2eb51a07308205fa3470c35c643f09d0dcfbb1cdf7d49df9a3e8ad726dc50d56e18e5d2609da23b84312a213322257f826cc912c8082351a740e4add37d5f523881cf3751f2af688f5d75fa88977cc985f2fa1f7053f5b4c4a4dd648fdc9b1b910c754ca4de6956c8b0617deeccf3f773f683ff34a7b8aa31ba8155101f7c06095c3687e74e59a8d4ff2a7e8567f57b169048f13a3c87d8e15cf4c28200d620377f114ca1f680542f5160a2567a49ed02a660befe647028049419bfb7949ffa14b6c441a2731d21301dd64b5b67422d383ff3f8c3a43a7dbfb62d4e7a5ffd3ff1b5abcc8e01e650be3ce6dc568e6b5e1151342b78366e0f4235aee3c698edf3ce989323b5ca9eda36d8ecc8d2150c6bb64b2f2b1ffa102b5dcce1fd92f566ce133841d0a5740fa7c5f8f4a999784b195f11f38719855603ad5ba6ef84656993a684c3b3621838ba1ca2c3192da514876a8def1ff062d13be6d3ddd92c2828f4c0e341205b669887d29f9eccb89d7e360d81a971bf88215ec3d2f89964082958f8f03541ee282c5025c418b51d1a9aec3adaa7874bb357d60857b49816e38c6097b53eba7a5bae0c5b727780796ddbecb5cb43af0621c7dc5118e56f8d462a5dd7b78867ca7cd12b0291cc52730fd690c612de4b90b7132416952c5fb88d45edf9529b5949a0d25997273077b2f8eaccf39cbda3519443dec61859509bb8054a94db7887a0d88b3b635b64eb14b24dffea5d639807942ab0b472ce8298f0f174ebc39034ceaf6ce7cc69bed40cf1c7a512f60012894eaaf632239b64c00ff457f277962afc480889b20c401149d4e8b1ebc0d01c7493dcfa5ab221ccf71499d772cc3e622820c27472f309942d1cb536b48bf020ad954632b66d66c5991972dc4ee3540a1f61b3a59ffe043bcb9987bbb5b2130d5a0189c3911a71ec327c7cd36e0a020989fb2bd7237e524d2f83ad026391c4af0e700072b138d7075d04896cf92b07e87d7f78909cc286d42c714d9e546ba6cd1f732712d593e6dc71ff15dfed0caab589fa5fe8233113a1b7bdf86c7e3243d585c189c3a68be9c2888929223c14d95f99e1f8632036baafdae5a517e0f58a76ec21008fcf8d1b2c8fa4bc52a6be9f160b14b56ade9ace19e9eb1e29b4efbc53e9092d2c9de9a839240a21b96aceb28e147faf592328fff1f32b6e05b936a30e616a574acf60f006aa27c8b74a7ef495d7036e03c3477b03e1f380401291e75e5c385c103164f09c9983ead87f066ca5a4ad3d1c2bab06f03dd422c1ee426a6d9f6575510136dd8891352d3e408975752582cb967664239f815703e7514d2a027c5b2712aaf1578e6558786df5a4b22015a6f7e3024ff59fa4db3a86fea2acc760aece4c63955bfadc55ca369e99bd84e53bd34ce6fe5903f70cdb40ba9483f678d1c0684fd7c92a95341e9011acecce2133ddd5462e1c63205475eeed8fb3ef7151be498c15a647f605338ccf796d54f3cd5c13118bdf8e2c5645826584fa2fcd2e48dc0ffaea76973fc9077c5038f604bb62b443de616b321ec7254628621422684e75717c799baa087602e131ce53e6ec95baa6344c14c8e817b304be16fc2a01c4227691ca13f4e3787c03a2d6b60db9202889f0490d9e51390dce8f18e5e44f937f3fc71fd700323c2549847d66b597ff376d4148176d89e718ff2095ea08f27d1648a8312ab41b2e76a39faf42333ecfaa05a49574ab1a8f3cf9f5c55fb55bd9be5069058ea917a7897a52bccc3924445e3a77c1278464118fe8a19707967f0f745758da8b8063d0395abc9e0de194b8e3d6a214e8ae32467221e65bfb3e31a69f0e1d257967a9c17f19f568315ef9e25b1c12e9c2b9339397e876467cc81ae031a6f858417d3236228f004a841a2d166c0d13aca2249fac3739c025cec78e8f09403da0e9e45b30f33a2f780bf61adb7ebc2c2c44715f1056f87ba8aa74e77c5547b150cbc9753ace7193c42210ef7ca2cd34bbb40f030d3d5bb006bfcf2ae5ce0222397d07b00a93cc811d3d659398c6983fb903027e47e56bfc92eec10ce2be986d57e24f36413187f3b67cfd76f6406dc3ac232e345b31189aee0b8a8f5f011ef6412f0885e30e43569b6a0cf278056957694352dbe995cbd4c04c21be8555850800625ca19262095e26bc8a520575d88af85bd2844b318674cf1a5918a753e53e208a3126a03c16e41661922614b8def3acca44a230b011c6ccd8e01d3655e0780dc628836a3221a60b3ba89b57c720000c4f5e4882e0b70306b365da855643c63e31e6433fcde4268e4702a553c5275c90c14e5a4a2e72fe0ef95db464678452742249a4dbefc065c09c77c0fa8de1173f7d220ef7a0436bc3914069bb7c9db7ab52f3c81a899d84b60b7b21df299c639d6b8bced550bc3e953f95a4090a4311cb531b787129172a4079db56c788f2e47210da56e945efaeffd07eb1996cd237e79106a6a05ee3ef40ebb4aaa7d90157f3df703193b18d5c4c8fa99061a7cc793e69859f01231a494b75e420e5e2a6dd2f6dfc33ca91829f483faf07784e1e19b5ac77010afec125b6f24928b2bcf87aa2db94c0639a31ec43cbcd7be46511e47255d1fc3bab02ce82f5fd247b60ddb19f922a4a0352e3b8bd91aab80fbf1ffa9b8cb32e71ddad4500e8581ebe6bf858beec642cb551a43011bc78a93461d25cd6087b0fc95413eb3f6df3400f707a6e253d55ed3cb46606d288a757f2a1864968acbf582176b08dffddbe66c5b8804a59dfe2900f5459b3538d89fa3b2f573d5d71c6ccc21f80343a9b4a7112b5366f663ca22bdf6994bfd4b55147bc0f3a43b03b9615155ae9a3c100bffb5466918debe6a413e3fc1eeaaf10169a68ba0b4ac50b8f8ad560329a89a213426709e7758c40d7cd746d1fbd280c82c6ef8e5ffebf6e943d654285391c35a69547d611ca3cd3d0c2421389bf214181a839c1b349a9ab6187cea6e0cd4640be35714dcc7b37d521cb81f78fc30ab4a47289f078de13ec43ccac1cb10a6537f3a03de83a18567e010e5ff8426c6f69f10f62a39a28e2e0131468dc45baa1a3e29d5213558f172aaabbcfeb1ad0b41f8b29a5ffe888344db0c02f5e6a61428b23ff1f22b18298b6f54248d889b74155a843bd198ece8c3013125de37ad80a5622edbf528be80e9bdc00eb451d9f3d984faed89717ba81bfe18e1bafdf555c5c865bc5ad2679c0d24a8db568c6ad35117a6b67f21e4cd0efaebe9d7180d4f62a41e5c4052d98a650ca64eb919ed7ca2f562c5caa2bb2d897c948e69b976026f3635a5fd262c21f99c58d7354f175199af74ff21a0df96b438a71212602da9ae5ec39713b29b71919ecf5394bf33d4cffe12fed4dc70ae4bd7422eeac40cb48fee59a6520cda83c00200e5e3ebbf93a044f6bfe4c01efb4cd7f0bfd212e096ea882b3bc6b1e4d0487b076ae9ab889866f2fd70273f7d7d4f916e656c2a9add6a143f69a73a1781a6e87c42313071802ed3333ae3f1d4d0f4be5771fe62d8aaf996466afb5623dbaf06cc87402238c94830f674f91bf51e0899b95650f204cfd20e84f2f43053ce7e7ad2e3271b6b1edf3b4890d5be68f26703a6c0465e6b67af3783023f84c682cc37fbe02e724d45270147d052b327b1a7d2d8c746bd5d96314a078e1930981ff8ac3a8b28b5b7c15884b2f699a26130da5aedad86d08b285c9865ba693a7f9d00f576e7d3010a1faa18054f38c75feb2a8a4b2557be68cdf60424839c4b3535bbc7ae8900e5968c7cbb5c518b52f8d16c03d8550d377c83ee0a9874200164ec3859fb12f86d05f4af050bc856fa4b7e8660f7f2d9f680eca44a49114ceff3fbd06b498ddd695b4528b23cdf71341c5545e2b33d0d41d7c50068d612be84763bb105a456f62528ce49098c70a49ee551dde04d5a4b9ccd5208710617aa520c67c9b355b708fdfd46c785a8e4f07db397a98a7dc7cace2f93d01f2c3abbede7f461bc273448e2d380c23373549a2c6c8a83fe5dda18dcf2f3a856dd3df81034116e68e08c181fb0361a2b3791ff94d9b41d108ef4881e0a7c8abe400cc8003e6e548336433af0a3dd3f034fe5db4e088d98ecdf4dffe1506cc3c97545a11252c5f7d1d9043f443a0bc259c9ee255879bfb15056184376e706c3b1615a77b874f26dc4db0ea4248815336209ba1400971824e06b0e722617b453739d1f7af16cdd1c56b48cb20ccb50eab6481deebd9d3ed2139a3352e91eea3381588fec4cb7dd5745c79629ccd57709f628bbd2dc7fc312a2c47669d7bc135775445322886f2dcde54b3705d335334505e12d5727d05cf93718c2e2a2db685a06ef4f1e07fe598026cdaef83b4f5d67045a102c90bedcb2b92d2697218ccc17099e6eabbd081b9150859efc50a63a239fcbd758ee2f3cab27bf317f1def83459f1d2cc15262572feff4b50ff43ceab7d24e16cb31f3a671fb447da2a6585314c3068f69a2d0d4c594cd0ec04d26786e0b9ac7f9c9c3fa97d0981fc19cda6b56c9e7e31fbe77716cebdc7fcdfa38408a76a8fafcd8e84f4c5b7261de304de5ad981d73f5949e980e9ac73f0f7d46c2cd58c2d5e7dadc9768687c0c4a1adac2540e39e56923f25906819c9b19e8769aa690d3e3e1e51e24e1309ad4cda54fc482a26a49bd36c9b81c0eb5bde36fcc6b18633d9b4e6e07f58dc5d7242d86c0d97e8e172e1d4a23a0c843c5f62c3ee8031a97e561843b5d433b3464daf0cf014fc63e161894a2cb70e1560f244bc0f0d6d6a47a430d900fe5fcdeaad13acaa3aeac29b675296556f9f001dfc72f7c63b608ed830ea975ea0ce2acb7be843e870d09e40d0a03b3255562992f8c5f75271b878718a0bbd52d54d2226ee5ebb340cfce4c4893d72dda3162785db13f72d3f4978d5ae678f8729482fae0649dd877c2fecb8270fb3a473dd2829fad52820d8ce8fc7df9c1fd213785eee8c7205fea098b429e63e7399fd468416cbb5085269d1b1efd5f3ee2e2a4aa5c9adf1201ee3a4c07ea4a9b55d78be9bc3f3ef956ba82278b5d7f49554fed99871c27e4fb231fdeb682b88dba4c244c42528931f9d6aa90c7ac05ebba89f6b3627617e04a281c857326d1ad3c18b58903ca8da6c6470a46eefae8f51466de12a6cd79fc08d3474c1af79dcc7cbdddca4715b0a470fde8b48e570e9dfac14f3009c4c26a0ae5bdbdf83da216a8cf6a33af5ab0fad49cef1163f4399bc190d80e90bfc6aeec423e2526f6c35ec4f1bea457c16b3691ee636e9923a182076a865921a9dcce2ff51993b5ba1c38da50a28476b0ef59d9c22e954de14ea1eee0b93816ff4153abd5214fee8ce79c92d1e6cb53fca91447d859142609972daa3336a501612e582af17c6702021c1db5544e9086db68da4b4178b0f402e62384a423e75c1e1d6e463b681b44ff5213e8ed5d8861c72ba42abdf078a18b69936a52b48cc94e9da40bbb2bb9caad1629de148f7750fe900057e5ceac585607b7cb61f9e623d79832f68ac9adb037b71fbecd82edc764b1e8c874ecaa8ab6450bd4724ba2a26b433765497c77ccbc7459c09a8a92f6fff000530e0055a359c1dd74ec0b9e97894a80fb23622e287c89dc6732722f1eb40a869ec218e29f6903546eaaed9c4f28fb35d9409a8d250f4d06d8005a8738e9d85832e5fd0617c3649222e7334e3b35342ee0e7cc13a258e401c743435268a35fb67ac65ca9678f48bdc9e6a4093939e75c5416a7a55db9e1c507dc96ae02b3a0a02c1f880ac2e87a15904ad64970eb7940510d40443365fd216bc177a68609719f7cd32365993ec150351f734c7128e78b8f344933160473a3323ebaf6f9859e22caa8d64ab629ebf80c82beec12301091ee9132d697a2f25d8e574ab62662d1eeed79b1550a30810c6eab660a09ef48ac0ce853a22d42430058f8bf8ef42b9c3c0e0fd94323d1a82ee2b64eec090ddf3b286f93737b7506fef629750e69253010c80669502810719d42454518fc97b0135ae60f32da3d3680124b7534b200cd6b33c1f428e433ac47c82831634bfb54e23eefa3f544b9d90c618d1ae3a8ec3008cad0f83007dcf3a691a051d3112f524bf8b8eb839f2bed0cae878afccaa46f794ab88440c9fe3ce8308e35b858de81cf9545b33dc5de21546632ce4df96044520380a38d258107eb0225fa8ea6c75c1c759d2212f180da53221ceac7481a3c2f64e8486f3cad311ed769e4bc5728ddc913470fd84cd346a14d5b1344c87a0a5bd2674127d87ec67602b23ea7d543d118295595f6555d4469facc34c7d135947369fd60f42e96d5ad520c8588dc91cfa8f739c9a4f139fb8643722e9eea9a0e3720f71cebca832cd25ff01099e60258279b92b31a88e0302f6ac4330d7dae807987479199e91f490af35eed17a0f53732b5af38c0e5588d6ce252bb27633cfba7f03e44464f05974df86c2cb26df36c2b2c2cfe20ac90b85ad803d06f881cb6f10e119b8beda3805bb69c24da24c6d949b9e545a950160514e98b156ea23037b3b5934cca012a70443c99800a822e8e2539cf9346e50a82cf2f45776332057ed6e2d2478aa2393da339c6252300307691450b8da6291d7339fa6d17e66ff8c80ae99c52d1c1c6e9d7eb23a4832f41ba5b6912ac758cd69f31387958c5b047e34deb4dbb2e3416ad7a886e18a5f0b9c123a7b23077f8a13a08ec0d027f0d7bb49a50ce8380cddc320809025e40cffb2bfcc853ceb38ebce0ba29aaa736fbb8f146a04ce7be4b09ed9edbd1ce3dfcc65a8d61daeabfdb2c1fa103b2ece1423d3245428ff35c928d876f23303fc5354377241684b2c0bb55048d776e7a96d89d033432967d27311d2efaa01e1ccd07393011d71d4475c8232493a72cd1d6daf2320c0bad0e2addfc5ecd3d1aee6169f61375a358899084db37d2d2577d29f6b23759f532ff9a22d9b11470801889938451778fce55e6b59046ec2bc4c2f0c770aac149ca4c57a56506a3c72f2670c4f1c85e509cd918b0e31b4f09b9719ee47394bddb0ca0d1f694c2a1563308ff8c0d6358eb0e60acae0e6ad096723561bf2de8250bf0226d252ac01171d0c95aa7eb45c7e260a7cf54147d7f631c4627bad956fe640a7aa7315433e26c68517d7acdd01b9c35433d1c8f72e86a0f99a0729039c38ac2ce1855b1da72ad883ac97312e52a7f0c33e4968e14cae251cf295f437a981c336f7c43e828637e8807619830c49fc6e6b10508614d98bfd32b9a7b87b2b75869b62d95112e17f1944371cc1225e7bc446ef3826a694020f841529d649d04b4e89fd8961b28303eff09ea1c62de6386f453ac2bda33891840f0a0a649755f882a5a428a35ecfd884f9ee7b6a1ba63a68f739c6eaa7aef2edd9dc8a0fca57df29d67db42202857e98ac4f3cc7399cd8d6f5386db7963f1e7ce973a040be3462b329803e6ecb1a496bc96369136be2d3099964c8b9864ba7e89b6395270f62e63343169963dec69a3089f76687535bf10107f"}, 0x6a00) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) 17:10:53 executing program 4: socket(0x1d, 0xfffffffe, 0x9) 17:10:53 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000000)=0x3000) 17:10:53 executing program 5: write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/49, 0x0, 0x81, 0x1}, 0x20) 17:10:53 executing program 4: socket(0x1d, 0xa00000000000000, 0x9) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x1}) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000040)=[{'SYNTH', @val={' \'', 'Master', '\' '}}], 0x24) 17:10:53 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x8, 0x2, 0x7fff, 0x7ff, 0x42, 0x10000, 0xa42e, 0x8000, 0x0], 0x9}) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:53 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) write$usbip_server(0xffffffffffffffff, &(0x7f0000000180)=@ret_submit={{0x3, 0x0, 0x0, 0x0, 0x6}, 0x800, 0x92, 0x3, 0x3b6, 0x6, 0x0, "9e258a4043ebeae6fe3923a2510d25bf02198a7665ebaea4fc0ef50028698d102760d51514924228925ab4b331c9de7685aefe586877afa000810ad98c715fbd76951589b48866a85b2e9aa9a09eb995e188209610fa031c85c959d5d4a8340ef7d9d65b4d7dcc9f2266aec99329592679dae9aec511b5b95098cc78b7091d3f07beb47148d67b2decb679f3fbae66b3baa6", [{0x8, 0x1f, 0x4, 0x1f}, {0x1, 0xffff, 0x9, 0x3d96}, {0x6, 0x9, 0x101, 0x8}, {0x6, 0x0, 0x3, 0x7fff}, {0x8, 0x5, 0x3, 0x1}, {0x6, 0xfffffff0, 0xb15, 0x84a}, {0x3, 0x9, 0x3, 0x6}, {0xcfc, 0xe0000000, 0x9, 0x10001}, {0x1f, 0xfffffff9, 0x6, 0x5}, {0x9, 0xfffffff7, 0x1, 0x800}, {0x10001, 0x65, 0x5, 0x7f}, {0x9, 0xff, 0x80000001, 0xb2c2}, {0x9, 0x0, 0xff, 0x3ff}, {0x5, 0x7f, 0x0, 0xbc7}, {0x3, 0xff, 0xfff, 0x9}, {0x6, 0x3, 0x0, 0xffffff83}, {0x7, 0x3, 0x8, 0xe7c}, {0x9, 0x3, 0x7, 0x80}, {0x7fff, 0x1f, 0x6f, 0x1}, {0x5, 0xfffffe01, 0x9, 0x7ff}, {0x6, 0xffffffff, 0x1000, 0xff}, {0x83a98c6, 0x90f, 0xf76, 0x21}, {0xe09, 0x7fffffff, 0x6, 0x2}, {0xfff, 0xc34, 0xfff}, {0x1f, 0x1, 0x80000001, 0x20}, {0x800, 0x5, 0x98e, 0x10000}, {0x0, 0x7ff}, {0x2, 0x101, 0x4, 0x3}, {0x0, 0x80000000, 0xfffffff9, 0x3}, {0x101, 0xab}, {0x8, 0xbe}, {0x100, 0x1, 0x2, 0x2}, {0x9, 0x851, 0x8, 0x2}, {0xfffff9a4, 0x1, 0x7, 0x9}, {0xfff, 0xffff, 0x7, 0x5}, {0x80000000, 0x9, 0xcb6}, {0x1000, 0x3, 0x372f, 0x6}, {0x6, 0x0, 0xdd19, 0x9}, {0x6, 0x7fff, 0x6, 0x8001}, {0x6, 0x4, 0x0, 0x1f}, {0x479, 0x4, 0x10000, 0xa56}, {0x0, 0x163, 0x8, 0x1f}, {0x65f44a4c, 0x7, 0xef04, 0x4}, {0xd8d, 0xfffffffc, 0xfff, 0x7fff}, {0x6, 0x7f, 0x4, 0x101}, {0x8, 0x9, 0xffffff81, 0x4}, {0x8, 0x4a55, 0x3, 0x4}, {0x7f, 0x6, 0xffffff4a, 0x5a}, {0x1000, 0x8, 0xd552, 0x3ff}, {0x1f, 0xd9, 0xcc, 0x5}, {0x7, 0x80000001, 0x4, 0x1ff}, {0x5, 0x100, 0x40, 0x9}, {0x100, 0xfff, 0xd3, 0x5}, {0x1, 0x5, 0x9, 0x10001}, {0x80, 0x7, 0x8, 0x6}, {0x20, 0x9, 0xffffff81, 0x6}, {0x5, 0x8, 0x8, 0xffff}, {0x1000, 0x4, 0x40, 0x7}, {0xe4, 0xb3e5, 0x3, 0x8001}, {0x1, 0xfffffff9, 0x8, 0x61}, {0x5, 0x3, 0x7, 0xffe}, {0x0, 0x80000001, 0x1ff, 0x6}, {0x1, 0x9a70, 0x101, 0x4ee0983e}, {0x9, 0x2, 0x5, 0x5b9}, {0x8, 0xd2f32e2, 0x20, 0x8ae}, {0x6, 0xc95, 0x4}, {0x5, 0x0, 0xfffff800, 0x5}, {0x800, 0x3, 0x0, 0x4}, {0x20, 0x31, 0x4, 0x800}, {0xffffffff, 0x7, 0x303, 0xfffffff9}, {0x8001, 0x1, 0x5, 0x4}, {0x6, 0x100, 0x156, 0x9}, {0x5, 0x0, 0x2, 0x1ff}, {0x7fff, 0x4, 0x3, 0x303}, {0x8, 0x5, 0x2, 0x7ff}, {0x20, 0x8, 0x800, 0x5}, {0x7ff, 0x4, 0x879, 0x8}, {0x1ff, 0xffffffff, 0xffff, 0x800000}, {0x20, 0x2, 0x80, 0x100}, {0x5b4, 0x6, 0x401, 0x8}, {0x10001, 0x2, 0x2, 0x4}, {0x1000, 0x101, 0x4, 0x401}, {0x2, 0x5, 0x0, 0x5}, {0x9a62, 0x2, 0x3ff, 0x3}, {0x3, 0x4, 0x1, 0x401}, {0x401, 0x10001, 0x1, 0x66}, {0x6, 0xfffffc00, 0x9, 0x8001}, {0x4, 0x3, 0x61e0, 0x9}, {0xdca, 0x77e, 0x84e, 0x4}, {0xffffff57, 0x7, 0x8001, 0x8cb}, {0x1ff, 0x101, 0xd56, 0x5}, {0xfffffff8, 0x80000001, 0x1, 0xd8000}, {0x0, 0xfffffffa, 0x2}, {0x1ff, 0xffff, 0x80000000, 0x5}, {0x2, 0x3, 0x1, 0x9ab}, {0x8, 0xfffffff7, 0x0, 0xe02d}, {0x7, 0x7f, 0x80000000, 0x1}, {0xffffffff, 0x1, 0x3, 0x15d0}, {0x5, 0x9, 0x8, 0xff}, {0x4, 0xde9e, 0x2, 0x1000}, {0x10001, 0xff, 0x4, 0x80000000}, {0xff, 0xffffffe1, 0x100, 0xffff8000}, {0x7f, 0x401, 0x1, 0x3f}, {0x20, 0x1f, 0x3f, 0x92f}, {0x3, 0x9, 0x101, 0x3ff}, {0x2, 0x0, 0x7fff, 0x7}, {0x1, 0x3, 0x0, 0x20}, {0x7, 0x6, 0x5, 0x2}, {0x6, 0x9, 0x3, 0x8}, {0x3, 0x3, 0xffffffd3, 0xbbf}, {0xd7, 0x20000000, 0x100, 0x3}, {0x5, 0x1ff, 0x3ff, 0x5}, {0x7, 0x1afbab88, 0x5, 0xa93}, {0x8, 0x1cb6, 0x0, 0x2}, {0xf4a7, 0x5, 0x7ff}, {0x4, 0x8, 0x2, 0x1}, {0x80000000, 0x4, 0xfff, 0x3}, {0x7fffffff, 0x1, 0x5, 0x5}, {0x9, 0x1d, 0xaf, 0xfffffff8}, {0x0, 0x10001, 0xe6d7, 0x401}, {0x8, 0xffffffff, 0x101, 0x10001}, {0x0, 0x80000001, 0x1f, 0x101}, {0x3, 0x3, 0x0, 0x6}, {0x1, 0x36d4, 0x7, 0x5}, {0x1, 0xca, 0x6a6d, 0x80000000}, {0x10000, 0x4, 0x4, 0x3ff}, {0x1, 0xff, 0x1f, 0x2}, {0x80000000, 0xab1, 0x800, 0x180000}, {0x1, 0x1, 0x4, 0x3}, {0x0, 0x1, 0x3a, 0x3}, {0x7, 0x3, 0x8, 0xfff}, {0x10000, 0x7, 0x20, 0x2a7}, {0x7, 0xffff, 0xa23, 0x10}, {0x0, 0x7fff, 0x7fffffff, 0x5}, {0x4, 0x531f, 0x7ff, 0xfffffffc}, {0x0, 0x3ff, 0x9, 0x7}, {0x1, 0x3, 0x8000, 0x4}, {0x42cc, 0x7fff, 0x4, 0x1}, {0x8, 0x6, 0x800, 0x881}, {0x1092, 0xb13000, 0x3, 0x282}, {0x4, 0xea, 0xff, 0x5}, {0x0, 0xffffffc1, 0x7ff, 0x2}, {0xff, 0x81, 0x5, 0x5cb26dea}, {0x88d, 0x10001, 0x7fc7, 0x1}, {0x100, 0x1, 0x4, 0x101}, {0x8, 0x4, 0x1, 0xff}, {0x2, 0x9, 0x1, 0x4}, {0x10001, 0x800000, 0x8000, 0x4}, {0x10001, 0x5, 0x7, 0x6a86}, {0x5, 0x400, 0x3ff, 0x80000001}, {0x8, 0x4, 0x0, 0x5}, {0x7f, 0x8000, 0x1ff, 0x6}, {0x800, 0x20000, 0xffff, 0x4}, {0x1, 0x9, 0x7, 0x9f8}, {0x8, 0x2, 0xb5, 0x5}, {0x0, 0xf6, 0x3, 0x7f}, {0x655cadf6, 0x3b2, 0xc4e, 0x1}, {0x7f, 0x2, 0x6, 0xffffffff}, {0x3, 0x0, 0x1, 0x5}, {0x5, 0x4, 0xfffffc00, 0x8}, {0x3, 0x5, 0x10001, 0xfff}, {0x7512, 0x36, 0x5, 0x5}, {0x1, 0x7, 0x6fe7, 0xfff}, {0x4, 0x2, 0x800, 0x8d}, {0x4, 0x5, 0x40, 0x5}, {0xb6, 0x800, 0x8, 0x5}, {0x80, 0x6e, 0x6, 0xffffffff}, {0x6, 0x6, 0x10000, 0x5}, {0x6, 0x2, 0x85}, {0x0, 0x1, 0x80, 0x3af}, {0x1, 0x401, 0x6, 0x1}, {0x2, 0x1000, 0xb716, 0x5}, {0x5, 0xffffffff, 0x0, 0x401}, {0x7, 0x0, 0xb09a, 0x9}, {0x1, 0x0, 0x8, 0x8900000}, {0x7, 0xfffff000, 0x10001, 0x400}, {0x0, 0xdd, 0x10000, 0x4}, {0x3, 0x1, 0x9a20, 0xffffff7f}, {0x1000, 0x7, 0x8, 0x1}, {0x8, 0x1, 0x3, 0x6}, {0x7fff, 0x7, 0x8, 0x6}, {0x4, 0x5, 0x0, 0x6}, {0x400, 0x2, 0x10001, 0xcd}, {0x9, 0x5, 0x5, 0x77}, {0x1, 0x800, 0x40, 0xffff}, {0x0, 0xff, 0x7, 0x55ae}, {0x63, 0x6, 0xf59d, 0x947}, {0x10001, 0x400, 0x0, 0x6}, {0x3, 0x20, 0xff, 0xede}, {0x19800, 0x3, 0x8000, 0x1}, {0x8, 0x5, 0x7, 0x3}, {0x0, 0x3, 0x7, 0x3}, {0x101, 0x3, 0x8, 0x58e7d05}, {0x8000, 0x4, 0x8, 0x5a9}, {0x3, 0x1, 0x2, 0xe61}, {0x7f, 0x400, 0x588f, 0x7}, {0x8, 0x993a, 0x5, 0x5}, {0x2268, 0x20, 0x80000000, 0x261}, {0xfffffffa, 0x67f4, 0xfffffffc}, {0x3, 0x2, 0x209c, 0x6}, {0x552, 0x7ff, 0xed3a, 0xf35}, {0x8, 0x7f, 0x10001, 0x6}, {0x40, 0x3, 0x3ff, 0x8980}, {0x4, 0x2, 0x3ff, 0x7fffffff}, {0x0, 0xfffffffa, 0xd1, 0x3}, {0x7, 0x8, 0x1, 0x6}, {0x4, 0x3f, 0x3, 0x8}, {0x80000001, 0x4, 0x239, 0x80000001}, {0x81, 0x7, 0x7fff, 0x4}, {0x80000000, 0x4, 0x200, 0x28}, {0x687c}, {0xb58f, 0x903, 0xd7, 0x80000001}, {0x7fff, 0x1000, 0x9, 0xfffffffc}, {0x4, 0xfff, 0xcc58}, {0x1, 0x20, 0x4, 0xd5d3}, {0x1f, 0x3272, 0x1, 0x6}, {0x7, 0x8, 0x1, 0x2}, {0x9, 0x8000, 0x800, 0x165b}, {0xffffffff, 0xff, 0x9, 0xb25c}, {0xad2e, 0x3, 0x0, 0x4}, {0xffff, 0x6, 0xfffffff7, 0x80000000}, {0x3f, 0x8000, 0x4, 0x2}, {0x0, 0x101, 0xff, 0x1b}, {0xa3, 0x10001, 0x4, 0x400}, {0x4, 0x1ff, 0xc8a, 0x7f}, {0x485, 0xfffffff7, 0x0, 0x6}, {0x587, 0x6805, 0x401, 0xff}, {0x7, 0x1, 0x3, 0x2}, {0x8, 0x7, 0x800, 0x4}, {0x8, 0x54877827, 0x1, 0x7}, {0x2, 0x8, 0x4, 0x9f6}, {0x2, 0x7fff, 0x3, 0x8001}, {0xffff, 0x4, 0x9, 0x9}, {0x5, 0x10001, 0x3, 0x80}, {0x6, 0x1, 0x8000, 0x5}, {0x9, 0x7, 0xcabd, 0x7f}, {0x7a9, 0x7, 0xff, 0x9}, {0x8f4, 0xd, 0x45a, 0x20}, {0x80000001, 0x8, 0x7f, 0x8}, {0x80000001, 0x3, 0xe9, 0x7ff}, {0x7, 0x1, 0x3, 0x95c}, {0x1f, 0x401, 0x3, 0x9}, {0x8000, 0xfffffff7, 0x4, 0xb37e}, {0x1, 0x1, 0xe0, 0xe5f8}, {0x1b68, 0x3f, 0x1, 0x2}, {0x6, 0x3, 0x7, 0x2}, {0x20, 0x13a7, 0xff, 0xf2}, {0x7fffffff, 0x5, 0x8, 0xfffffffe}, {0x7, 0x1, 0x4, 0x2}, {0x0, 0x7fff, 0xff, 0x5}, {0x20, 0x32636b75, 0xe4a, 0x1}, {0xfffffff9, 0x5, 0x101, 0xfffffffb}, {0x7f, 0x0, 0xec, 0x6}, {0x40, 0x9, 0x8, 0x4}, {0x1ff, 0xa9, 0x6, 0x3}, {0x7f, 0x5, 0x80000001, 0x1f}, {0x3f, 0x10000, 0x347a, 0xd6c7}, {0x1, 0x2, 0x9, 0x7fffffff}, {0x827, 0x6, 0x4, 0x2}, {0xffffffff, 0x200, 0x5, 0x401}, {0x4, 0x5, 0x8, 0x5757}, {0x6, 0x36, 0x2, 0x576410e3}, {0x6, 0x7fffffff, 0xf89d, 0x80000000}, {0x81, 0x7062, 0xbc6, 0xfffffff7}, {0x8000, 0xff, 0x1f, 0x7ff}, {0x9, 0x2, 0xbe, 0x80000001}, {0xcd, 0x0, 0x3f, 0x8}, {0xfffffffe, 0x5, 0x101, 0x20}, {0xfffffffe, 0x7, 0x3, 0x7}, {0x6, 0x401, 0xb9b, 0x10000}, {0x2, 0x9, 0x4, 0x3}, {0x400, 0xffff8001, 0x9, 0xb}, {0x6, 0x69, 0x200, 0x200}, {0x5, 0x51a7, 0x57fa, 0x30a}, {0x6, 0x7, 0x4, 0x6}, {0x72, 0x1, 0x101, 0x80}, {0x8, 0x7f, 0x1, 0x80}, {0x9, 0x0, 0x80000000, 0xff75}, {0x70c, 0x7fff, 0x80, 0x8001}, {0x6, 0x3, 0x7fffffff, 0x9}, {0x63, 0x3e2e, 0x9, 0x5}, {0x40, 0x95, 0x0, 0xfff}, {0x4, 0x800, 0x874, 0x6}, {0xcb14, 0x9, 0x9, 0xfff00}, {0x100, 0x40, 0x6, 0x9}, {0x100, 0x4, 0x0, 0xc55188d}, {0x4474, 0x8, 0x9, 0x3}, {0x80000, 0xfce, 0xfff}, {0x6, 0x1, 0x2, 0x81}, {0xffffffff, 0x716f, 0x8, 0xe011}, {0x2, 0x9, 0x6, 0x1}, {0x6, 0xff6, 0x6, 0x4}, {0x7, 0x4, 0x5, 0x2}, {0x1, 0x400, 0x3, 0x2}, {0x40000000, 0x4644, 0x3ff, 0x1}, {0x9, 0xd80, 0x5, 0x7}, {0x5, 0x81, 0x1, 0x7}, {0x7, 0xfffffe59, 0x5}, {0xff, 0x9f26, 0x2, 0x1ff}, {0x80000000, 0x9, 0x4, 0x9}, {0x909b, 0x8, 0x2, 0x2}, {0xff, 0x3, 0x101, 0x11c}, {0x9, 0x8, 0x5, 0xffff1c8d}, {0x3, 0x5, 0x5, 0x7f}, {0x4, 0x4, 0x2, 0xe7e}, {0x10001, 0x200, 0x3, 0x7f}, {0x7, 0x80000000, 0x76e, 0x400}, {0x1000, 0x7fffffff, 0x7, 0x80000001}, {0x1, 0x1, 0x2, 0xff}, {0x56, 0x101, 0x8, 0x40}, {0x7f, 0x0, 0x7, 0x2}, {0x8001, 0x1ff, 0x1000, 0x6}, {0x10000, 0x0, 0x0, 0x2}, {0x2, 0x0, 0x5, 0xfffffff9}, {0x2c, 0x7f, 0x59a, 0x1}, {0xffffffc0, 0x9c, 0x80000000, 0x7}, {0x4, 0x4, 0x3, 0x3}, {0x80000000, 0x7, 0x5, 0x7}, {0x0, 0xda38, 0x9, 0x2}, {0x6ee, 0xffff8001, 0x497, 0xfff}, {0xfff, 0x1ff, 0x0, 0x3f}, {0x1, 0x8, 0x9}, {0x4, 0x5, 0x7, 0x5}, {0x6, 0x8001, 0x8, 0x8}, {0x3, 0x3, 0x3, 0x4ec}, {0x8, 0x10000, 0x9, 0xffff8001}, {0xd230, 0xffffffe8, 0x7, 0x75}, {0x80000000, 0x1, 0xfff, 0x1}, {0x10001, 0x35d, 0xc2, 0x3}, {0x5, 0x8, 0x81, 0x2}, {0x200, 0x8, 0x51, 0x9}, {0x2, 0x400, 0x3f, 0x8}, {0x1e19, 0x100, 0x129b, 0x401}, {0x1, 0x1, 0x101, 0x3}, {0x7, 0x6e, 0x8, 0x2}, {0x8000, 0x6, 0x10000, 0x5}, {0x7f, 0x1, 0x2, 0xf4}, {0xfffffeff, 0x800, 0x1, 0x8001}, {0x4, 0x3, 0xfffffffe}, {0x4, 0x401, 0xc485, 0x3}, {0x6, 0x6, 0xfffffe00}, {0x81, 0x2c, 0x4, 0x7b0f338b}, {0x101, 0x0, 0x4}, {0x9, 0x0, 0x4, 0x7}, {0x8001, 0xfff, 0x401, 0x1}, {0x1, 0x6, 0x5}, {0x2, 0x3, 0x7, 0x7}, {0x2, 0x7fffffff, 0x1000, 0x81}, {0x926, 0x0, 0x7fffffff}, {0x6, 0xde, 0x81, 0x2}, {0xdac, 0xfffffc00, 0x81, 0x3}, {0x2, 0xa450, 0xd, 0x3}, {0x7, 0x8, 0x3, 0x3}, {0x5, 0x2, 0x10001, 0x80000000}, {0x3, 0xda, 0xe0a, 0x8}, {0x5, 0x9, 0x8000, 0x306}, {0x8be, 0x6, 0xe8d2, 0x986}, {0x8, 0xfffff93c, 0x80000000, 0x7}, {0x80000001, 0x9, 0xfff, 0x2}, {0x1000, 0xffff1829, 0x9, 0x8}, {0x5, 0x2, 0x7, 0x1}, {0x6a1, 0x1, 0x4, 0x7}, {0xfffffff7, 0x9, 0x4, 0x7f}, {0x1400, 0x8, 0x31e8, 0x9}, {0x1, 0x1, 0x6, 0x20}, {0xfffffffb, 0x1, 0x7, 0x3}, {0x3a, 0x8, 0x80000000}, {0x0, 0x1, 0x80, 0x4}, {0x14f, 0x89, 0x5, 0xd206}, {0x3ff, 0x2, 0x8c32, 0x3}, {0x80000000, 0x5, 0xbc74, 0x3f}, {0x1, 0x2, 0x1, 0x8dd2}, {0x10000, 0x5, 0x2, 0x2}, {0x5, 0x48, 0x8, 0x580}, {0x62, 0x400, 0x4, 0x4}, {0xffff9e90, 0x7fffffff, 0x6, 0xede}, {0x1, 0x3, 0x3f, 0x9}, {0x0, 0x20, 0x3ff, 0xffff}, {0xe0f, 0xff, 0x80000000, 0xffffffff}, {0x6, 0x7, 0x4, 0x1}, {0x400, 0x955e, 0x3, 0x40}, {0x401, 0x81, 0x26, 0xffffffff}, {0x8, 0x422, 0x0, 0x543}, {0x7, 0xa8b, 0x401, 0x8001}, {0x3ff, 0xffffffff, 0x1f, 0x101}, {0x1ff, 0x1, 0x8, 0x1}, {0x6, 0x2, 0x1, 0x5}, {0xfffffff8, 0x0, 0x9, 0x8000}, {0x2, 0xff, 0x0, 0xfffffffa}, {0x3, 0x7b2c, 0x750, 0x65d7}, {0x1, 0x808, 0x40, 0xfffffffe}, {0x1, 0x8000, 0x1, 0x400}, {0x4, 0x3, 0x3, 0x6}, {0x300000, 0x6, 0x3, 0x3}, {0x66, 0x3, 0x0, 0x401}, {0xfffffc00, 0x0, 0x40, 0x556}, {0x8, 0x113, 0x101, 0xd0}, {0x6, 0x1, 0x0, 0xffffffff}, {0x100, 0x2, 0x6, 0x1678bb54}, {0x5, 0x8, 0x10001, 0x8}, {0x0, 0x28d, 0x3f1a, 0x37d}, {0x9ed, 0x80, 0x0, 0x5}, {0x36fba33f, 0x5, 0x8, 0x1}, {0x7f, 0x0, 0x5, 0xea3}, {0x8, 0x2, 0x10000}, {0x8, 0x8, 0x1, 0x7e2d}, {0x5, 0xc9, 0x40000000, 0x6}, {0xb2, 0x7fffffff, 0x8, 0x80}, {0x3, 0x5, 0x5, 0xffffffff}, {0x7, 0x1, 0xfffff802, 0x8}, {0x2a, 0x8001, 0x7, 0x8}, {0x401, 0x8, 0x7, 0xffffffff}, {0x12, 0x800, 0x2, 0x2}, {0x5, 0x0, 0x3f, 0x3f}, {0x820, 0xfffffffc, 0x3, 0x4}, {0x2, 0x2, 0xb9f0, 0x6}, {0xfff, 0x3ff, 0x0, 0x8}, {0x5, 0xfffffffb, 0x7fff, 0x1}, {0x6, 0x9, 0x20, 0x7}, {0x4f72, 0x3ff, 0xfff, 0x6}, {0x7, 0x7, 0x8000}, {0x0, 0x7f, 0x800, 0x4}, {0x10000, 0x2243, 0x8, 0xf8ef}, {0xa4e5, 0x0, 0x2, 0xbe}, {0x7, 0x1, 0x10, 0x2}, {0x8001, 0xb307c4bc, 0x3, 0xb76}, {0x10001, 0x8000, 0x40, 0x100}, {0x1, 0x8000, 0x188, 0x1}, {0x75, 0x6f32dfef, 0x9}, {0x5, 0x9, 0x8, 0x10000}, {0x5, 0x0, 0x71e7, 0x1}, {0x0, 0xfff, 0x1e, 0x50d}, {0xc1, 0x474c, 0x0, 0x800}, {0x8b, 0x180, 0x7, 0x3}, {0x800, 0x20, 0x2, 0x81}, {0x3ff, 0xb3, 0x3, 0x3ff}, {0x10001, 0x1c2, 0x40, 0x80000001}, {0x7fff, 0x0, 0x1, 0x7}, {0x80000000, 0x10001, 0xb1c}, {0xffffffff, 0xdf6, 0xfffffffa, 0x7}, {0x9, 0x3, 0x7fffffff}, {0xfff, 0x800, 0x6, 0x1ff}, {0x1, 0x7fff, 0x4, 0x8}, {0x8, 0xfd9e, 0xfffffffd, 0x2}, {0x3, 0x0, 0xff, 0x7}, {0x58, 0xffffffff, 0x8000, 0x6}, {0x4, 0x400, 0x9, 0x20}, {0x0, 0x45, 0x89, 0x6}, {0x7f, 0x9, 0x7, 0xe78}, {0x3, 0x7f, 0x553}, {0xdb, 0x10001, 0x2, 0x1}, {0x0, 0x7fffffff, 0x7, 0x2}, {0x7, 0x4, 0xa1d4, 0xffffffff}, {0x80000001, 0x120000, 0x13, 0x3}, {0x8001, 0x81, 0x1ff, 0x9}, {0x28a3, 0x7f, 0x94e9, 0x3f}, {0x9, 0x6, 0x1000, 0x5}, {0x80000001, 0x7fffffff, 0x7, 0x7000}, {0x1, 0x3, 0x1, 0x40}, {0x80000001, 0x2, 0x9, 0x4}, {0x2, 0x400, 0x2, 0x200}, {0x6, 0x1000, 0x1f, 0xfffffbfd}, {0x7fffffff, 0x3f, 0x6, 0x8001}, {0x9, 0x7ff, 0x1, 0x383a}, {0x5, 0x0, 0x80000001, 0xffffffff}, {0x7, 0x7, 0x3, 0x40}, {0x431, 0x8, 0x7}, {0x2, 0x7, 0x0, 0x3}, {0x8001, 0x5, 0x5, 0x8}, {0x2, 0x9, 0xff, 0x9}, {0xb2, 0x2, 0x8000}, {0x7, 0x49f09ec, 0x1, 0x49c1}, {0x4, 0x4, 0x1, 0x9}, {0x3, 0x10000000, 0x92, 0x8}, {0x4, 0x81, 0x80000001, 0xfffffffe}, {0x82, 0x3, 0x5, 0x4}, {0x7, 0x81, 0x2}, {0xffff, 0x1, 0x6, 0x3}, {0x9, 0x1ff, 0x40, 0xb97}, {0x4, 0xd4b0, 0x18e, 0xeb}, {0x40, 0xfffffb63, 0x1, 0xffffff81}, {0x4, 0xfffffff7, 0xfff, 0x2}, {0x1f, 0x5, 0xf1e, 0x101}, {0x20000000, 0xffffff01, 0x40, 0x1}, {0x7f, 0x3, 0xed9, 0x2}, {0x0, 0xfffffffa, 0x3, 0x7}, {0x1e, 0x9, 0x4, 0x7ff}, {0x96, 0xfffffff9, 0x0, 0xfffffffa}, {0x58, 0x1ff, 0x800, 0x8}, {0x20, 0x1000, 0x0, 0x5}, {0x400, 0x7fffffff, 0x3}, {0x4, 0x7, 0x2, 0x7}, {0xe61, 0x9c5, 0x8, 0x2}, {0x1, 0xd5f, 0x2, 0x4809}, {0x0, 0x10000, 0xfffffff9, 0x400}, {0x1, 0x101, 0x4126, 0x8}, {0x9, 0x8, 0x6, 0x4}, {0xffff8001, 0x7fff, 0x1, 0xda}, {0xfffffff8, 0x5, 0x7fff, 0x81}, {0x4, 0x6, 0xd, 0xcb07}, {0x6, 0xfffffff9, 0x5, 0x6}, {0xfffff2c8, 0x3f, 0x3f, 0x2}, {0x400, 0xfff, 0x9, 0x2}, {0x7f, 0x401, 0x0, 0x7}, {0x5a9, 0x0, 0x6, 0x3}, {0x80000001, 0x200, 0x6, 0x9}, {0x8, 0x1000, 0x1000, 0x3ff}, {0x7ff, 0xd02b, 0x7, 0x7}, {0x8001, 0x2, 0x2, 0xf1bf}, {0x6, 0xff, 0x8, 0x3f}, {0x3, 0x0, 0x20, 0x7ff}, {0x10001, 0x6, 0x0, 0x1ff}, {0x0, 0x3, 0x7fffffff, 0x3ff}, {0x2, 0xffff, 0x1ff, 0x80}, {0x7fff, 0x92, 0x8, 0x1f}, {0x4, 0xfb5, 0x8, 0x7}, {0x1000, 0x1f, 0x1f, 0x5}, {0x81, 0x35, 0x4, 0x7f}, {0x100, 0x7, 0xb9b, 0x40}, {0x60, 0x8, 0x0, 0x7fff}, {0xbe2, 0x6, 0x10001, 0x5}, {0x6a, 0x4617, 0x5, 0x9}, {0x8, 0x7, 0x100, 0x7f}, {0xfffffffb, 0x8, 0x4, 0x2}, {0x8fe7, 0xa0, 0x2d, 0x1}, {0x5, 0x8, 0x4, 0x4}, {0x3, 0xbde0, 0xfffffe01, 0x3}, {0x3, 0x565, 0x1f, 0x800}, {0x75, 0x1ff, 0x6, 0x4}, {0xffff0001, 0x2, 0x16, 0x5}, {0x7, 0x642c, 0xff, 0xffffffff}, {0x8, 0x1ff, 0x37, 0x3}, {0x9, 0x1, 0x8000000, 0x9}, {0x7ff, 0x10000, 0x4f, 0x3}, {0x465, 0x20, 0x0, 0x80000001}, {0x1, 0x6, 0x9, 0x8}, {0x93b, 0x100, 0x3, 0x40}, {0x1, 0x1, 0x2, 0x3}, {0x1, 0x60b, 0x8, 0x6}, {0x9, 0x3f, 0x1, 0x2}, {0x7ff, 0x3, 0xae, 0x9}, {0xa915, 0xfffffffb}, {0x3, 0xfffffff9, 0x1, 0x2}, {0x3c, 0x23, 0x20, 0x9}, {0x6, 0x2, 0x2, 0x8}, {0x8, 0x1, 0x20, 0x3}, {0x10000, 0x0, 0x400, 0x3}, {0x5, 0x10001, 0x9, 0x10000}, {0x7, 0x7, 0xfffffff7, 0x20}, {0x6, 0x1f, 0x10000, 0x7f}, {0x1000, 0x1ff, 0x755b, 0x2}, {0xb61, 0x5, 0x8, 0x2}, {0x200, 0x0, 0x38f, 0x80}, {0xce, 0x3382, 0x6, 0x35c}, {0x9fd, 0x4, 0xfffffffd, 0x4}, {0x8, 0x1, 0x8, 0x35}, {0x364, 0x1, 0xfb, 0x9}, {0x10000, 0x101, 0x80000001, 0x1f}, {0x0, 0xfffffffc, 0x2, 0x40}, {0x0, 0x895, 0x9, 0x4}, {0xb6, 0x4, 0x6, 0x80}, {0x2, 0x1d5, 0x800, 0xfffffffa}, {0x7ff, 0x0, 0x2, 0x5}, {0x401, 0x7fff, 0x7, 0xb1}, {0x200, 0x6, 0x0, 0x8}, {0x7, 0x200, 0x8001, 0x8000}, {0x8, 0x80, 0x4}, {0x2, 0x7fff, 0x6, 0x8}, {0x9, 0x788, 0x7fff, 0xffff}, {0x3f, 0xff, 0xffffffe0, 0x4dac}, {0x2, 0x2, 0x7, 0x9}, {0xab, 0x9, 0x0, 0x93}, {0x101, 0x1ff, 0x3f, 0x5}, {0x3bf3, 0x7, 0x800}, {0x5, 0x7ff, 0x8, 0x80000001}, {0x1ff, 0x3, 0x1, 0xd773}, {0x2dc, 0x4f8, 0x0, 0x88}, {0x200, 0x5, 0xffffffff, 0x7}, {0xfffffffc, 0xd1d16cb4, 0x6, 0x9}, {0x1, 0x0, 0x80000001, 0xfd1}, {0x9, 0x200, 0x9ed8}, {0x2, 0x2, 0x9, 0x8001}, {0x7, 0x2, 0xb, 0x101}, {0x8001, 0x3ff, 0x6}, {0x0, 0x8, 0xfd11, 0x2}, {0x8, 0x1f, 0xf6, 0x7ff}, {0x7, 0x3, 0x0, 0x7f}, {0x5, 0x5, 0x3f, 0xd821}, {0x2a7, 0x0, 0x80, 0x6}, {0x6, 0xb8dc, 0x6909, 0x8000}, {0x7, 0x81, 0x3, 0x589e}, {0x2, 0x0, 0x7fffffff}, {0x95, 0x7, 0x10000, 0x7f}, {0x22bd, 0x9, 0x3, 0x4}, {0x80000000, 0x4, 0x2, 0x81}, {0x546, 0x5, 0x0, 0x2}, {0xff, 0x1, 0x3, 0x800}, {0x2, 0x1c00, 0x20, 0x55065b63}, {0x3, 0xffff, 0xffff7fff, 0x3}, {0x7ff, 0x8, 0xfff, 0x1}, {0x3ff, 0x7, 0x4000400, 0x8}, {0x7, 0x1, 0x6, 0x401}, {0x2, 0x800, 0x7fffffff}, {0xf0, 0x7, 0x2, 0x1f}, {0x5, 0x9, 0x5, 0x6}, {0x51c5, 0x6, 0x5, 0x4}, {0x2, 0x8, 0xdc58, 0x2}, {0x0, 0x0, 0x9, 0x3fb25acf}, {0x8, 0x8, 0x8000, 0x3a}, {0x3, 0x3ff, 0x3, 0xb2c0}, {0x4, 0xcb19, 0x0, 0x5}, {0x7, 0x7fffffff, 0x0, 0x4}, {0x32a, 0xfffff4b3, 0xd430, 0x401}, {0x9, 0xffff, 0x0, 0x66f}, {0x0, 0xdb, 0x7, 0x1}, {0x6, 0x1, 0xa8}, {0x7f, 0x5, 0x20, 0x7}, {0x81, 0xff, 0x1f, 0x6}, {0x9, 0x4, 0x4, 0x2}, {0x5, 0x5, 0x5, 0x101}, {0x0, 0x28, 0x84f9, 0x2d}, {0x6, 0x1, 0x7, 0x300000}, {0xfffff1f6, 0xfffffff9, 0x2, 0x7}, {0x3f, 0x7ca6, 0x81, 0x1000}, {0xfffffffa, 0x8, 0x8}, {0x401, 0x3ff, 0xfffffffd, 0x3}, {0x101, 0x0, 0x9, 0x8}, {0xfff, 0x9, 0xff}, {0x1, 0x7, 0x3, 0x6}, {0x2, 0x9, 0x9, 0x1}, {0x6, 0x8000, 0x14d, 0x3}, {0x40, 0x200, 0xc, 0x8001}, {0x7ff, 0x6, 0x6, 0x1}, {0x6, 0x42bef472, 0x9, 0xe275}, {0x0, 0x8, 0x10001, 0x7}, {0x0, 0x610986b2, 0x4, 0xffffffff}, {0x6, 0x10001, 0x9}, {0x5, 0x7f, 0x8, 0x260}, {0x3, 0x1ff, 0x10001, 0x6}, {0x80000000, 0x9, 0x9, 0x9}, {0x3, 0x0, 0x1, 0x1e72}, {0xe58, 0x4, 0x3, 0xc}, {0x41ef, 0xfffffff7, 0x3, 0x5}, {0x401, 0x7, 0x3f, 0xffff8000}, {0x79d4d3b, 0x7, 0x100, 0x3cd}, {0x3, 0x1000000, 0x2, 0xfff}, {0x4c33, 0x0, 0x1ff, 0x7}, {0x80000001, 0x9, 0x6, 0x6}, {0xfffff001, 0x6, 0xfff, 0x5}, {0x1ff, 0x2, 0xfffffffb, 0x7f}, {0x400, 0xff, 0xffffffff}, {0x1000, 0x6, 0x72e, 0xffff}, {0x7e5, 0x100, 0x1000, 0x7}, {0x400, 0x5f3f74a4, 0x2}, {0x3, 0x200, 0x8, 0x209c}, {0x5, 0x3, 0xfff, 0x9}, {0x5, 0x1, 0x2, 0x21}, {0xffff, 0x5, 0x7, 0xee05}, {0x4, 0x1f, 0x9, 0x3}, {0x8, 0x4, 0x0, 0x8}, {0x2, 0xfffffffd, 0xffff, 0x80000000}, {0x101, 0x5, 0xff, 0x3f}, {0x3, 0x318, 0x4, 0x9}, {0x1d, 0xffff, 0x9, 0x8}, {0x9dc9, 0x401, 0x3, 0x4}, {0xfffffffc, 0x1, 0x12c0, 0x80000001}, {0xfffffffd, 0x7fffffff, 0xff, 0x70f}, {0x413, 0x8001, 0x1000, 0x7}, {0xfff, 0x4, 0x9, 0xda}, {0xfffffc01, 0x9, 0x2, 0xc79}, {0x78, 0x449, 0x5}, {0xff, 0x6, 0x7fffffff}, {0x4, 0x7f, 0x8, 0x9}, {0x8, 0x2c, 0x100, 0x5}, {0x3, 0x5, 0x7, 0x4}, {0xfffffffd, 0x6, 0x0, 0x80000001}, {0x2, 0x4, 0x400, 0x9}, {0x200, 0x8, 0x1, 0x3}, {0x0, 0x1000, 0x10001, 0x9}, {0x0, 0x9, 0x4, 0x3ff}, {0x9a27, 0x32a, 0x10001, 0x1ff}, {0x1, 0xff, 0x80000001, 0x9}, {0x5, 0x66, 0x5, 0x100}, {0x1, 0x1, 0x20}, {0x8, 0x38e2425b, 0xe80, 0x3}, {0x6, 0x6, 0x9}, {0xffffc570, 0x8, 0x20, 0x4}, {0x9, 0xffff, 0x1, 0x3}, {0x7, 0x0, 0x6, 0x1}, {0x101, 0xd3, 0xffffff7f}, {0xf15, 0x1, 0x3, 0x42}, {0x4, 0x0, 0x1, 0x2}, {0x9, 0x8, 0xf4fd, 0x7}, {0x0, 0x3, 0x1ff, 0x9}, {0x7fffffff, 0x80, 0x9, 0x4}, {0x3, 0xffff, 0x20, 0x3ff}, {0x718, 0x0, 0x7, 0x3f}, {0x7, 0x4, 0x40, 0x40}, {0x43c, 0x6, 0x1, 0x1}, {0x6, 0x3b119204, 0x3ff, 0x8}, {0x4, 0x9, 0x8, 0xfffff899}, {0x5, 0x3, 0x7, 0x8001}, {0x3, 0xffff, 0x2, 0x7}, {0x419, 0x6, 0x1, 0x5}, {0xfc, 0x914d, 0x2, 0x100}, {0x4, 0x4, 0x401, 0x3}, {0x0, 0x101, 0x6, 0x8}, {0x800, 0x5, 0x1, 0x8}, {0x61, 0x0, 0x0, 0x8}, {0x5, 0x10000, 0x6}, {0x9, 0x0, 0x7, 0x3}, {0x400, 0xfffffffa, 0x8, 0x7}, {0xffffffff, 0xffffffff, 0x3}, {0x7fffffff, 0x80000, 0x9, 0x7fff}, {0x1000, 0x7f, 0x8, 0x6}, {0x200, 0x9, 0x3, 0x4}, {0x93, 0x1, 0x800, 0x1}, {0x3, 0x5, 0x6, 0xfb38}, {0x2, 0x6d, 0xffff, 0x7}, {0x5346, 0x2, 0x8, 0x2}, {0x7, 0x8, 0x5}, {0x80000001, 0xff, 0x7, 0x43d6436b}, {0x5, 0x2, 0x4e1, 0x1}, {0x0, 0x52e, 0xfffffff9, 0x1}, {0x10001, 0x9, 0x4984, 0x3}, {0xb99, 0x1000, 0x40, 0x3}, {0x8, 0xaa6, 0x80000001, 0x6}, {0x6, 0xa2, 0x6c83b172, 0x2ce}, {0x200, 0x80000000, 0x7fff, 0x8}, {0x7ff, 0x9, 0x1d73, 0xc3}, {0x3f, 0x1ff, 0x0, 0x4}, {0x1, 0x4, 0x8, 0x4c}, {0x8, 0x1000, 0x63ac1379, 0x3}, {0x1, 0x8001, 0x10000, 0x6}, {0x100, 0x2, 0x9, 0x5}, {0x10001, 0x8, 0x8, 0x6}, {0x1, 0x6, 0xffffffff, 0xffffffff}, {0x8, 0x101, 0x5, 0xd5}, {0x6, 0x7fff, 0x7e43, 0x9}, {0x8, 0x9, 0x7f, 0x5}, {0x401, 0x7, 0x3d, 0x3f}, {0xffffff32, 0xcf5f, 0xebc, 0x2}, {0x7, 0x2, 0x8, 0xff}, {0x9, 0x1, 0x1, 0x80000000}, {0x10000, 0x40, 0x9, 0x8}, {0x1abc40, 0x400, 0x1, 0x4}, {0x5, 0x1, 0x3, 0x7}, {0x1, 0x1, 0x0, 0x2}, {0x1, 0x401, 0x6, 0xdd}, {0x8, 0x86, 0x6, 0x7fff}, {0x4, 0x5, 0x317, 0x101}, {0x1000, 0x1, 0x4, 0x401}, {0x1000, 0x600, 0x1, 0x5}, {0x5, 0x7, 0xb4, 0x7fff}, {0x10001, 0x5, 0x1f, 0x101}, {0x81, 0x7fffffff, 0x80000001, 0x3}, {0x1000, 0x4, 0x6, 0x3}, {0xd2e, 0x0, 0x5e, 0x6}, {0x0, 0x9, 0x7, 0x16e49b8b}, {0x3ff, 0x90a5, 0xfff, 0x417396be}, {0x40, 0xffff, 0x6, 0x7fff}, {0x1, 0x6, 0xffffffc1, 0x401}, {0x1000, 0x65a, 0x0, 0x81}, {0x8808, 0x4000000, 0x9}, {0xfffffffc, 0x1ff, 0xb93b}, {0x80c, 0x3, 0x4, 0x80000000}, {0x1, 0xd98, 0x8, 0x5}, {0x1, 0x5, 0x400, 0xfffffffb}, {0x90000000, 0x7, 0x1ff, 0x10d}, {0x8, 0x3, 0x20, 0x40}, {0x9, 0x4, 0x80000000, 0x3}, {0x9, 0x3, 0x5, 0x7f}, {0x8, 0x100, 0x7fffffff, 0x7fffffff}, {0x6, 0x8, 0x7f, 0x7}, {0x4, 0x3ff, 0x9, 0x1}, {0xfff, 0x101, 0x7fff, 0x8}, {0x80000001, 0x87, 0x80000000, 0x400}, {0x4, 0x1, 0x4, 0x3ff}, {0x75, 0x20, 0x0, 0xe4}, {0x7, 0xa9, 0x1f, 0x3ff}, {0x7ff, 0x100, 0x9, 0x8001}, {0x2, 0x7ff, 0x800, 0x5}, {0x7, 0x600000, 0x79a, 0x40}, {0x9, 0x2000000, 0x3, 0x7}, {0x8, 0x3b3, 0x40, 0x6}, {0x800, 0x0, 0x5, 0xfffffffa}, {0x1, 0x101, 0x7}, {0x1ff, 0x0, 0x3a7, 0x3}, {0x10000, 0xffffffff, 0x7511f74e, 0xafc5}, {0x5, 0x10001, 0x800, 0x3}, {0xdc, 0x3, 0x300, 0xfd5e}, {0x4, 0x2, 0xfff, 0xff}, {0x3, 0x8, 0x318b, 0xe3b}, {0x0, 0x1, 0x3, 0x2}, {0x3875, 0x3, 0x8000, 0x3}, {0x9, 0x2, 0x8}, {0x4, 0x48, 0xb13b, 0x1f}, {0x4, 0x9, 0x800, 0x200}, {0x800, 0x1ff, 0xe37, 0x8001}, {0xd705, 0x6, 0xffffffff, 0x1}, {0x0, 0x7, 0x1, 0x8}, {0x7, 0x4, 0x8, 0xcd4}, {0xdc, 0x4, 0x6}, {0xf69, 0x8, 0x8, 0x5}, {0x81, 0x1, 0x100, 0x1}, {0x1, 0xe8e5, 0x8, 0x9}, {0x7, 0x7e32, 0x7461, 0x3ff}, {0x4, 0x1000, 0x0, 0x8}, {0x1000, 0x1, 0x100, 0x5}, {0x5, 0x7fff, 0x1ff, 0xd2aa}, {0x3, 0x3, 0x2, 0x3ff}, {0x8, 0x0, 0x4, 0x9}, {0x2, 0x8, 0x3f, 0x10000}, {0x5, 0x3, 0x800, 0x8}, {0xbf62, 0x1ff, 0xe000, 0x9}, {0x100, 0x20, 0x3c8569d9, 0x10001}, {0x5000, 0x5, 0x9, 0x9}, {0x5, 0x81, 0x2c, 0x8}, {0x0, 0x8, 0x1, 0x5}, {0xdac, 0x0, 0x3, 0x80000000}, {0x4, 0x5fec, 0x7ff, 0x6}, {0x0, 0x100, 0x7fffffff, 0x80000000}, {0x5, 0x1, 0x6, 0x80000000}, {0x4, 0x9, 0x4, 0xffffff8e}, {0x4, 0xcaa3, 0x4, 0x60000000}, {0x10000, 0x3, 0x2, 0x6}, {0x7, 0xfff, 0x8, 0x1000}, {0x2, 0x8009, 0x0, 0x3}, {0x200, 0x3, 0xffff8000, 0x71}, {0x8, 0x80000001, 0x8, 0x2}, {0x3ff, 0x8001, 0x3, 0x81}, {0x0, 0x6, 0x8, 0x81}, {0x3, 0x4, 0x7ff, 0x9}, {0x0, 0x3, 0x401, 0x80}, {0x479, 0x3ff, 0x1, 0x5}, {0x4, 0x80000001, 0x6, 0x29}, {0x5, 0x7, 0x7f, 0x8}, {0x9, 0x5, 0x27e6, 0x7ff}, {0x9, 0x0, 0x80, 0x40000000}, {0x5, 0x7, 0x8000, 0x8025}, {0x8, 0x9e0, 0x3, 0xfff}, {0x7, 0xfffffffd, 0x80}, {0xff, 0xe4c, 0x9, 0x5}, {0x3, 0x4db87524, 0x1ff, 0xafa}, {0x3, 0x1, 0x7, 0xfffffff8}, {0x10000, 0x8, 0x6, 0x200}, {0x4, 0x0, 0x9, 0x1}, {0x1, 0x7, 0x8001, 0x4}, {0x4, 0xfffffffc, 0x5, 0x5}, {0x3bd, 0x101, 0x6, 0x7f}, {0x7ff, 0xdd7, 0x6, 0x3ff}, {0xfffffff8, 0x254, 0x8, 0xe35}, {0x916, 0xfaa, 0xffff0000, 0x1}, {0x0, 0xfffffff8, 0x1, 0x7}, {0xfffffff8, 0x0, 0x80000001, 0x9}, {0x5, 0x7, 0x7, 0x3}, {0x6, 0x4, 0x1, 0xffff0001}, {0xff, 0x12000, 0x7f, 0x1}, {0x401, 0x0, 0x7dd, 0x4}, {0xa0000000, 0x5, 0xb690, 0x6}, {0x8, 0x7, 0xffffff81, 0x1f9}, {0x5, 0xdc, 0x1, 0x5}, {0x3f, 0x9, 0xfff, 0x90}, {0x3, 0x7f, 0x11, 0xdd}, {0x0, 0x1f, 0x2, 0x9}, {0x1f, 0x3ff, 0x4bc6, 0x8}, {0xd98, 0x9, 0x1, 0x3f}, {0x100, 0xf441, 0x200}, {0x3, 0x9, 0xff, 0x1}, {0x3, 0x7, 0xfffffe00, 0x7}, {0x3, 0x7, 0x9, 0x101}, {0x10001, 0x6, 0x2, 0x1}, {0xee9, 0x8000, 0xff, 0x9}, {0xbf, 0x5, 0x9, 0x3}, {0x1ff, 0x1ff, 0x3e, 0x3}, {0x1, 0xff, 0x1, 0x40}, {0x10000, 0x101, 0x40000000, 0x6}, {0x100, 0x3b9, 0x6, 0x7}, {0x3, 0x1, 0x8, 0x400}, {0x101, 0xfffffff8, 0x0, 0x42}, {0x4, 0x0, 0x5, 0x6fa}, {0x8, 0x1, 0x1ff, 0x1f}, {0x9413, 0x7, 0x5, 0xffff}, {0x40, 0xaf, 0x101, 0x1}, {0x1, 0x9, 0xffffff19, 0x4}, {0x4, 0x3ff, 0x5, 0x88a}, {0xc, 0x8000, 0x10000, 0x9}, {0x5, 0x4, 0xc6f, 0x8}, {0x20, 0x7f, 0x9, 0x7}, {0x6, 0x0, 0x6, 0x1}, {0x5, 0x6, 0xffffffff}, {0x0, 0x0, 0x3, 0x4}, {0x40, 0xff, 0x200, 0x8}, {0x9, 0x80, 0x0, 0x80}, {0x5, 0x3f, 0xa7, 0x1000}, {0x1, 0xd5, 0x4, 0x580}, {0x4, 0x3, 0x7f, 0x3}, {0xf7, 0x5, 0x5dd, 0x9}, {0x6, 0x1, 0x2, 0xfffffff9}, {0x2, 0x4, 0xcd, 0x41000000}, {0x7, 0x20, 0x5b, 0x4}, {0x5cf2, 0x6, 0x2, 0x4c7a}, {0x3, 0xf4, 0x80000001, 0x5}, {0x4000, 0x80000001, 0x2, 0x1}, {0x0, 0x8, 0x2, 0x5}, {0x8, 0x6, 0x8, 0x8000}, {0x4, 0x8, 0x7, 0x4}, {0xfffffffa, 0xfc4c, 0xa671, 0x81}, {0x1000, 0xffff5937, 0x6, 0x970}, {0x1, 0x200, 0x40, 0x9}, {0x3, 0x100, 0x40000, 0xdcf}, {0x0, 0x7, 0x10000, 0x7fff}, {0x7fffffff, 0x1, 0x2, 0x3}, {0x1, 0x9, 0x4, 0x401}, {0x9, 0x8, 0x1, 0x200}, {0x3f, 0x0, 0x80000000, 0xa7}, {0x5, 0x2, 0x1ff}, {0x3, 0x81, 0x2, 0x1f}, {0xb5a, 0xffffffff, 0x6, 0x20000000}, {0x7f, 0x5, 0x5afc, 0x5caf}, {0x7, 0x7, 0x800, 0x9}, {0x1, 0x1, 0x8, 0x7c8}, {0x46a1, 0x0, 0x47db, 0x80000000}, {0x2, 0x6, 0x8001, 0x4}, {0x7fffffff, 0xe025, 0x0, 0x3}, {0xda4, 0x80000000, 0xffff3ab2, 0x1f}, {0x4e0, 0x316d, 0x3ff, 0x7e000000}, {0x1c000000, 0xffff, 0xed4, 0x1f}, {0x8000000, 0x1ff, 0x7, 0x80000000}, {0x20, 0x2, 0x8, 0x8}, {0x1, 0xffffff6a, 0x6, 0x6}, {0x2, 0x4, 0x4, 0x800}, {0x5, 0x6, 0x8, 0xff}, {0x6, 0xf6, 0x7, 0x4}, {0x7, 0x9, 0x3ff, 0x4}, {0x82e, 0x6, 0x4, 0x3f}, {0x2, 0xfffffff7, 0x3, 0x2}, {0x1, 0x401, 0xffffffe0, 0x9}, {0x1, 0x101, 0x7, 0x8}, {0x0, 0x0, 0x7, 0x7f}, {0x3, 0x6, 0xfffffffe, 0x4}, {0x9, 0x20, 0x8001, 0x4}, {0x2, 0x10001, 0x3, 0x1}, {0x1ff, 0xba4e, 0x3ff, 0x3f}, {0xf7b8, 0x3, 0x0, 0x100}, {0x4, 0x400, 0x1, 0x9}, {0x4, 0x8, 0x401, 0x4}, {0x3f, 0x20000, 0x8, 0x5}, {0x7fffffff, 0x8, 0x5, 0x4}, {0x6, 0x8, 0x6, 0x758}]}, 0x3c22) 17:10:53 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @local}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) keyctl$get_persistent(0x16, r1, 0xfffffffffffffff8) 17:10:53 executing program 4: socket(0x1d, 0xfeffffff00000000, 0x9) 17:10:53 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0xfffffffc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000000)=""/253, 0xfd}}, 0x10) 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x20000000006, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x7, 0x1}, 0x0, 0x0, &(0x7f0000000380)={0x1, 0x6, 0x54, 0x40}, &(0x7f00000000c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x6}}, 0x10) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14, 0x80000) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000400)=@req3={0x2, 0x57c1, 0x6d2, 0x80000001, 0x7ff, 0x72e3, 0x3}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f00000002c0)="0fede00faf7b5f6764f3a40f1c0565f4b836008ee80f79f867f30fc770080f2190660f38829f0900", 0x28}], 0x1, 0x0, &(0x7f0000000340)=[@dstype3={0x7, 0x1}, @dstype0={0x6, 0x7}], 0x2) 17:10:53 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/45, 0x0, 0x2d, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x6c8200, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x8, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 17:10:53 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/39, 0x0, 0x27}, 0x20) 17:10:53 executing program 4: socket(0x1d, 0x0, 0x6) [ 599.132993] can: request_module (can-proto-6) failed. 17:10:53 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/124) 17:10:53 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/47, 0x0, 0x2f, 0x1}, 0x20) socket$alg(0x26, 0x5, 0x0) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000300)={0x1ff, 0x20, 0x1}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x148, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PEERS={0x100, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9542}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x5, @mcast1, 0x789ca885}}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a36ec8baacd0d004ddde5c82165b8436db18bd308b03c908878cd58960643cf3"}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x50, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ALLOWEDIPS={0x44, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x31}}, {0x5}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0x148}}, 0x4) [ 599.159668] can: request_module (can-proto-6) failed. 17:10:54 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f8, 0x8, 0x70bd26, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc0}, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x74, 0x0, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2={0xfc, 0x2, [], 0x1}}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private2}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xfc}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x20004004) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:54 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) 17:10:54 executing program 4: socket(0x1d, 0x5, 0x9) 17:10:54 executing program 2: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x10, &(0x7f0000000000)={&(0x7f0000000180)=""/4096, 0x1000}}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={0x0, &(0x7f0000000100)=""/65, 0x0, 0x3b}, 0xfffffffffffffc1e) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, @fixed={[], 0x10}}, 0x8) socket$nl_audit(0x10, 0x3, 0x9) 17:10:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000580)={&(0x7f0000000100)={0x460, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x100}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x77}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x45a, 0x9, 0x4, 0x9}, {0x3, 0x6, 0x4, 0x10001}, {0x8000, 0xed, 0xfb, 0xcaa1}, {0x3, 0x0, 0x9, 0xbcd1}, {0x87, 0x0, 0x7, 0x800}, {0x2, 0x0, 0x0, 0x9}, {0x9, 0x80, 0x40, 0x2}, {0x47, 0xf8, 0xb2, 0x1000}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x25}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x460}, 0x1, 0x0, 0x0, 0xc001000}, 0x0) 17:10:54 executing program 5: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x1e8180, 0x0) read$proc_mixer(r0, &(0x7f0000000100)=""/231, 0xe7) [ 599.237498] device batadv_slave_1 entered promiscuous mode [ 599.253152] device batadv_slave_1 left promiscuous mode [ 599.273332] device batadv_slave_1 entered promiscuous mode [ 599.279659] device batadv_slave_1 left promiscuous mode 17:10:54 executing program 4: socket(0x2f, 0x0, 0x4) 17:10:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/71, 0x0, 0x47}, 0x176896def7805bd) keyctl$clear(0x7, 0xfffffffffffffff9) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/clear_refs\x00', 0x1, 0x0) 17:10:54 executing program 1: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00') syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) recvfrom$packet(r0, &(0x7f0000000080)=""/113, 0x71, 0x2, &(0x7f0000000200)={0x11, 0x1a, r1, 0x1, 0x4, 0x6, @dev={[], 0x1f}}, 0x14) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:54 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/51, 0x0, 0x33}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x551, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x100, @private2, 0x10}}}, 0x118) [ 599.312937] device batadv_slave_1 entered promiscuous mode 17:10:54 executing program 4: r0 = socket(0x1d, 0x0, 0x9) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000940)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000900)={&(0x7f00000000c0)=@getchain={0x34, 0x66, 0x2, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r1, {0x10}, {0xffe0, 0x3}, {0xffff, 0xfff2}}, [{0x8, 0xb, 0x7}, {0x8, 0xb, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8040}, 0x1) 17:10:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='.\x00', r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x6, [@func={0xd, 0x0, 0x0, 0xc, 0x4}, @fwd={0x4}, @enum={0x1, 0x5, 0x0, 0x6, 0x4, [{0xd, 0x5d}, {0x2, 0x6}, {0xd, 0x1}, {0x6, 0x8001}, {0xe, 0x3}]}]}, {0x0, [0x2e, 0x2e, 0x0, 0x61]}}, &(0x7f0000000080)=""/23, 0x6a, 0x17}, 0x20) [ 599.377429] device batadv_slave_1 left promiscuous mode [ 599.388008] device batadv_slave_1 entered promiscuous mode [ 599.411321] device batadv_slave_1 left promiscuous mode 17:10:54 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) socket$kcm(0x29, 0x8, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={r0}) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000080)={0x0, &(0x7f0000000140)=""/58, 0x0, 0x3a}, 0x20) 17:10:54 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x105000, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$CHAR_RAW_SECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000040)=0x6) 17:10:54 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) 17:10:54 executing program 3: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:54 executing program 4: socket(0x5, 0x5, 0x9) r0 = socket(0x0, 0x800, 0x3) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x6, @dev={[], 0x3e}}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x8000, 0x0) sendmsg$AUDIT_GET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x3e8, 0x1, 0x70bd29, 0x25dfdbfd, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20040004}, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x4, 0xffffffffffffffff, 0x1}) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000000)=""/68, &(0x7f0000000080)=0x44) 17:10:54 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000200)={0x0, "d3ecd51013e6997db4300964f809cb28c7e146ace99140f2dda0c968fb648e011421f0616c05423feeea67b7d102d160260b0c398069c8de1266c9468ea19132", 0x40}, 0x48, 0xfffffffffffffffa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) r2 = getegid() keyctl$chown(0x4, r0, r1, r2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x74f200, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x4) sendmsg$AUDIT_MAKE_EQUIV(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x3f7, 0x800, 0x70bd2d, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}}, 0x28}, 0x1, 0x0, 0x0, 0x11}, 0x4) 17:10:54 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) write$proc_mixer(r1, &(0x7f0000000000)=[{'MIC', @void}, {'IMIX', @val={' \'', 'Capture Switch', '\' '}}, {'PHONEOUT', @val={' \'', 'Mic Capture Switch', '\' '}}], 0x62) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x90881, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f00000000c0)={0x0, &(0x7f0000000080)=""/61, 0x0, 0x3d, 0x201}, 0x20) 17:10:54 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x80000000, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x1}, 0x0, 0x0, &(0x7f0000000080)={0x4, 0x6, 0x5, 0xfffffffa}, &(0x7f00000000c0)=0x6bef, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x4}}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_MAKE_EQUIV(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000f703000127bd7000fe66df25070000070000002e2f66696c65302e0104696c653000009f165123e90c630d23443011b1c329c7b2c6270531ccefa3d18832aa3c8d0b2fecb4cc1d69070ca50af729677f87e3ae30720b5caa0fbbf5161270ef2ad62908ecea745af2138fa656cd048a81a0b693bf33b0196b171a658c3812681ea2601d4e35c5f6b599035b4f9f601b5fc271210e8df08454286f9fac96b8eb71e3f0c44f88a89607fece625cd8602bf123b51e5959ea0c0fd798465c4ea2e1132d09594f2a63c66cd958314964c97093d33cca3371"], 0x28}, 0x1, 0x0, 0x0, 0x4002080}, 0x20000000) getegid() bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r0, 0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x5c, r4, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4080}, 0x40441) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) 17:10:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) socket(0x15, 0x6, 0x97d) 17:10:54 executing program 5: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x8) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000300)=""/4096) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001300)=ANY=[@ANYRESOCT=0x0, @ANYRES64, @ANYRESDEC=r0, @ANYBLOB="36640da1680bcaa5111121ce9318ebf0afaab4b7f9b51d010bfaefa471f6120b286b61f62185fc3b916bb0dea65038b385b044895f48298d43f90b40065c52f05013f236e61142e27f11c8ec7fc1", @ANYRES16=r0, @ANYRES64], &(0x7f0000000240)=""/180, 0xbc, 0xb4}, 0x5) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/53, 0x35}}, 0x10) 17:10:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/57, 0x0, 0x39, 0x1}, 0x20) openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) 17:10:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) connect$packet(r0, &(0x7f0000000140)={0x11, 0xf6, 0x0, 0x1, 0x3f, 0x6, @dev={[], 0xe}}, 0x14) r1 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x13) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x1000)=nil, 0x4000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x1a001, 0x0) connect$packet(r1, &(0x7f0000000200)={0x11, 0xd, r2, 0x1, 0x5, 0x6, @dev={[], 0x24}}, 0x14) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f00000000c0), 0x4) getsockopt$packet_buf(r3, 0x107, 0x6, 0x0, 0x0) 17:10:54 executing program 5: socket$kcm(0x29, 0x5, 0x0) 17:10:54 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x628080, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$rfkill(r0, &(0x7f0000000000)={0x1, 0x8, 0x3, 0x0, 0x1}, 0x8) 17:10:54 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/52, 0x56, 0x34, 0x80000000}, 0x20) socket$inet(0x2, 0x5, 0x3) 17:10:54 executing program 4: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=""/228, &(0x7f0000000340)=0xe4) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x2}}, 0x18) socket(0x1d, 0x0, 0x9) 17:10:54 executing program 0: recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/61, 0xfffffffffffffff2, 0x3b, 0x1}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_names\x00') getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000180)=""/71, &(0x7f00000000c0)=0x47) 17:10:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000001280)={&(0x7f0000001240)=[0xdb, 0x2, 0xfff, 0x8, 0xfffffffa, 0x6], 0x6, 0x0, 0x0, 0xffffffffffffffff}) getsockname$packet(r2, &(0x7f00000012c0), &(0x7f0000001300)=0x14) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) recvmsg$kcm(r1, &(0x7f0000001200)={&(0x7f0000000000)=@l2tp6, 0x80, &(0x7f0000001100)=[{&(0x7f0000000080)=""/67, 0x43}, {&(0x7f0000000100)=""/4096, 0x1000}], 0x2, &(0x7f0000001140)=""/129, 0x81}, 0x21) 17:10:54 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x64, 0x3ed, 0x100, 0x70bd28, 0x25dfdbfc, "f7d9cf494bb2f24ae0061789947f9f4188ee31c468019faa8424e2aaeb4e91092e79432284a861f361b08c9cbd113685723004960c34f6a7992689447aec410996d67819faf86bbc580f916473643249773c863d", ["", "", "", ""]}, 0x64}, 0x1, 0x0, 0x0, 0x20040050}, 0x40080) 17:10:54 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000100)={0x0, &(0x7f0000000180)=""/49, 0x0, 0x31}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x8}, {0x0, [0x30, 0x2e, 0x5f, 0x61, 0x2e, 0x0]}}, &(0x7f0000000080)=""/86, 0x20, 0x56}, 0x20) 17:10:54 executing program 4: socket(0x3, 0x2, 0x35) 17:10:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/72, 0x0, 0x48}, 0x20) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x5, 0x9], 0x2}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x200, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) 17:10:54 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/27, 0x0, 0x1b}, 0x20) 17:10:54 executing program 3: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000680)={&(0x7f00000001c0)={0x488, r0, 0x1, 0x70bd29, 0x25dfdbff, {}, [{{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7f}}}]}}, {{0x8}, {0x22c, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x408e}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x41}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}]}, 0x488}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r7 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r7, 0x107, 0x0, 0x0, 0x0) 17:10:54 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400000, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x400, 0x70bd29, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) 17:10:54 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) accept4$packet(r0, 0x0, &(0x7f0000000000), 0xc0800) 17:10:54 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) socket(0x1d, 0x0, 0x9) 17:10:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket(0x21, 0x800, 0x3) recvmsg$kcm(r0, &(0x7f0000000800)={&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000700)=[{&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000440)=""/88, 0x58}, {&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000500)=""/9, 0x9}, {&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f00000005c0)=""/244, 0xf4}, {&(0x7f00000006c0)=""/57, 0x39}], 0x9, &(0x7f00000007c0)=""/3, 0x3}, 0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='%\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00010100400001000400220004001400"], 0x28}, 0x1, 0x0, 0x0, 0x44040}, 0x2400c880) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000880)='l2tp\x00') socket$packet(0x11, 0x2, 0x300) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000940)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x40, r1, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x48010}, 0x20000000) 17:10:54 executing program 2: shmat(0xffffffffffffffff, &(0x7f0000ffe000/0x1000)=nil, 0x0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000080)=""/85, 0x55}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2, &(0x7f00000011c0)=""/27, 0x1b}, 0x20) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000001300)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x28, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) 17:10:54 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x4, 0x70bd25, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x8000000, 0x3, 0x0, 0x11}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 600.033553] device batadv_slave_1 entered promiscuous mode [ 600.057692] device batadv_slave_1 left promiscuous mode 17:10:54 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:54 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r0}) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)={0x154, 0x0, 0x8, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x138, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x0, 0x6, 0x3, 0x9}, {0x2, 0xa2, 0x9, 0x80000000}, {0x9, 0x6, 0x0, 0x7}, {0x3, 0x83, 0x1, 0x9}, {0x4, 0x90, 0x81, 0xf0}, {0x7, 0x0, 0x7, 0x8}, {0x0, 0xa0, 0x3, 0xa9}, {0x5901, 0x1, 0x2, 0x7f}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}]}}]}, 0x154}, 0x1, 0x0, 0x0, 0x8044}, 0x8001) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000001c0)={r0}) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000200)={'team0\x00'}) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, 0x453, 0x2, 0x70bd27, 0x25dfdbfe, "387c6cd31082f980f922dff060506a72b9275bc6b27609004a9a4765e8e23fde005a7cf020e98808b593ac944894f87d252b0c6cb9a015b93f7cd1d59f960d17a5d768a91aba760690f9b2e8703eaf9170dfc686099e0794565697e1c94cab12b9232103b3b67b7c87283aa0c1cbac3fc67dd465fea61b20cb1bf0a35594f7f5fc9e83fdff33a69a"}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x4000080) socket(0x1d, 0x0, 0x9) 17:10:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) recvfrom$packet(r0, &(0x7f0000000000)=""/4096, 0x1000, 0x60, &(0x7f0000001000)={0x11, 0x4, 0x0, 0x1, 0x40, 0x6, @remote}, 0x14) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000001c0)={r0}) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044c00}, 0x4000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/prev\x00') accept$alg(r3, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3f7, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 17:10:55 executing program 5: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x7000) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r0, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffff9}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x880) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/44, 0x0, 0x2c}, 0x20) 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) [ 600.205719] device batadv_slave_1 entered promiscuous mode [ 600.243292] device batadv_slave_1 left promiscuous mode 17:10:55 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg2\x00'}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0x1000) r2 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r2, 0x0, 0x0) keyctl$reject(0x13, r2, 0x3, 0x5, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4}, 0xc) msgget$private(0x0, 0x104) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x17c, 0x453, 0x1, 0x70bd2c, 0x25dfdbfb, "9c54d7fca76d7dba22490f52680559b710ab7e2ec5a2ec43dde564aedc4a412a31afc74d0f35b44eeb5bff9807597059beeb0bd8fe4880e5ce71e6400da324d0987b6ba3973ff32b07d8d00725d4ee471705c58702cac29a2054eafbbdc8e2ed043a2e39ab1b3e51ad2c762aad91486e850c5f4673261c71d3080ae98837f2c0f89e90e42340ae5bab07771dffec4c56182405b6767b30ca8337b760b0a6a49ed5173455dd013f87a61c57e09fcacbbc9390ab2e076e05e8b760bbadd0e1d15f1a1a9f9b526d5aa087016bcf6e8ab1c52344fe27d8bb6f4e54a646d1c0fd5ae716bd1e653e8b7cf0fc74e5bb1d710e25448d61ffdc63117e1fddb7fc5114c37327d6d7f57851db998bc0a897b76911d3c947daf26363490225944ce1129203c4917bc1650f2e6d380f63dc535d9c97e425746f60a4d6b30a46d2c730553b0aa518b39683ed4e7b21666d718739029c710b0a0322bf469af1d7341da1bea675c9f329dfe7aaf14fd31150df5b", ["", "", "", "", "", "", ""]}, 0x17c}, 0x1, 0x0, 0x0, 0x4000}, 0x4c800) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r4}) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x4c, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0={0xfc, 0x0, [], 0x1}}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) [ 600.264244] device batadv_slave_1 entered promiscuous mode [ 600.289397] device batadv_slave_1 left promiscuous mode [ 600.301159] device batadv_slave_1 entered promiscuous mode 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b, 0xffffffff}, 0x20) 17:10:55 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x121040, 0x0) [ 600.333189] device batadv_slave_1 left promiscuous mode 17:10:55 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/44, 0x0, 0x2c}, 0x20) 17:10:55 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x4000002) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000001400), r0, 0x1}}, 0x18) write$char_raw(0xffffffffffffffff, &(0x7f0000000200)={"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"}, 0x1200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0xf9dc0875) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:55 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e23}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5720}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8000004) r1 = socket(0x1d, 0x0, 0x9) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000100)=""/179, &(0x7f0000000000)=0xb3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000300)=[0xfde, 0xff], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000380)={r1, r2}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/vlan/vlan0\x00') accept4$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x800) 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/64, 0x0, 0x40}, 0x70) 17:10:55 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x5c1300, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/70, 0x0, 0x46, 0x400}, 0x20) 17:10:55 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @random="630d8b970c7c"}, 0x10) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x38, 0x1, 0x6a) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') read$rfkill(r0, &(0x7f0000000040), 0x8) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) socket$nl_route(0x10, 0x3, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x400, 0x70bd2d, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) 17:10:55 executing program 4: r0 = socket(0x1d, 0x0, 0x9) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) 17:10:55 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/33, 0x0, 0x21}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) read$rfkill(r2, &(0x7f0000000240), 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e21, 0x9, @ipv4={[], [], @loopback}, 0xfffff837}, r3}}, 0x4b) keyctl$update(0x2, 0x0, &(0x7f0000000280)="868f4a0efef8d30bdb47da8d569008edeb7d8358549478dc0cbf4483fda95fa62020fbcd7d641144dd9a17995933217409aa291515fce86775e6dd119e0a4663f91278c6604c924d499c341c4196482164f64375faf1e4dc35a0732b9b109b823fd98754dc7aea42fb53861309f6073d9a0f476479bd2b0aaa942e14e207b84acc6b3bb5f55d0a0917d171d917cbddcac8a90bb20d96889faa89edd62c94908d1896bae51d98f70e2033e9b60b9b9b7b1eb38582ef2b00b833903f095dd5987e9966845baef59242774c83a6d1bd01c93a2e3fa6abb5a5a8e23d95f83b8f9f96", 0xe0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) accept$packet(r1, 0x0, &(0x7f0000000080)) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = accept$packet(r0, 0x0, &(0x7f0000000080)) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) socket$packet(0x11, 0x3, 0x300) 17:10:55 executing program 5: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14, 0x80800) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x7fffffff, 0x8], 0x3, 0x0, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x2, 0x3}}, 0x20) r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r1, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) shmget$private(0x0, 0x4000, 0x8, &(0x7f0000ff9000/0x4000)=nil) 17:10:55 executing program 0: write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000200)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x1}}, 0x18) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) accept$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) connect$packet(r0, &(0x7f0000000300)={0x11, 0x19, r1, 0x1, 0x7f, 0x6, @multicast}, 0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xff}}, 0x10) 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/53, 0x0, 0x35, 0x3}, 0x20) 17:10:55 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x2000, 0x0) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3f6, 0xb21, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x400c0}, 0x4000001) r1 = socket(0x15, 0x1, 0x1bffffc) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) ioctl$CHAR_RAW_SECDISCARD(r2, 0x127d, &(0x7f00000002c0)=0x800000000000000) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000226bd7000fbdbdf25020000000500040081000000080011000000000008020900000000000c001000020000000000001c0006000000"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x20004004) 17:10:55 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f00000000c0)=""/69, 0x0, 0x45}, 0x20) 17:10:55 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x30000, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000040) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x800}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffff7f7}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x2}, 0x81) 17:10:55 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x3c600, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f00000000c0)={0x5, 0xc483, 0x5d, &(0x7f0000000040)="74a982fe1052fe16167c4cf432eca05f74073a5be055499df3a7d3bf4c0419d3630febc1a3add046c78b3de4b67a8691ddc6e7e641f2f1d7e94d866e8fe3e6e5f50a7dd60db903b710ebbfc29d033113de7f397bdce347f6931e4efb11"}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x18000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000140)=[0x7fff, 0x20, 0x3, 0x65, 0x1, 0x6, 0x4, 0x8, 0x9, 0x101], 0xa, 0x80000}) socket(0x1d, 0x0, 0x9) 17:10:55 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f00000000c0)={0x0, "61faffffded4ecbae421929686b66de53ec1ea368e435fdaf036d862b5d1145ffa35afcdfc7098e2684ac332dd1bb3790c6b4c97bbe0d38abbf5342f2e25c1c2", 0x1b}, 0x48, 0xffffffffffffffff) keyctl$negate(0xd, r0, 0x27, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r2) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/44, 0x0, 0x2c}, 0x20) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r3, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0xfffffffffffffff8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24048890}, 0x20000010) semget(0x0, 0x3, 0x201) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0)='l2tp\x00') r4 = syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x4, 0x400000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r4, 0xc01864c6, &(0x7f0000000480)={&(0x7f0000000440)=[0x101, 0x5, 0x0, 0x3, 0xffffff00, 0xbee0, 0x101, 0x8], 0x8, 0x80000}) 17:10:55 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x200}, 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000000000000080400dfffffffa5d2d8ab4fa45df6ee91007ee80000000000000ea407d890e54fa6ba72c9040000000000000089e6d96a7a0cd074fa3205286cf9b4ab2a87ce226e993341537a0d5b55f7fb911d29d639a915500e1c5073112d9f63782689cb03bc7665244ceb89e32a9088553c29950e03000076c570f2be5572bb24bdba8b68ef7c"], &(0x7f0000000040)=""/16, 0x27, 0x10}, 0x20) r0 = socket$packet(0x11, 0x2, 0x300) recvfrom$packet(r0, &(0x7f0000000300)=""/230, 0xe6, 0x2000, &(0x7f0000000180)={0x11, 0x1, 0x0, 0x1, 0x3, 0x6, @broadcast}, 0x14) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/vlan/vlan1\x00') ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000400)={&(0x7f0000000200)=[0x0, 0x2, 0x2, 0x7ff, 0x7, 0x0], 0x6, 0x800, 0x0, 0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f00000005c0), 0x4) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb8, 0x464, 0x100, 0x70bd28, 0x25dfdbf8, "46cb03b93d015ce2a85a979781aa83ff08b87f08a02f5d4c9b1c1147f733a2c5021cb0eba47e5e6788ed75f479d6bb4f59b269a7d2a341d4defbc43bf5dd902b70977dc29e8160d32a83687405f93df9b83954e4a648dcc95170fd4879db046c666ac5e4038fac6377637caf5e58726e62f4a306cc46c53870ca049540c705a213a711d4d4f5a54027e704bb5dcea2329d77266ded5ec82d707f20dd17f04604aa2b868ad3c033", ["", "", "", "", "", "", ""]}, 0xb8}, 0x1, 0x0, 0x0, 0xc000}, 0x4040000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000003b40)={r2}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000003c80)={&(0x7f0000003b80), 0xc, &(0x7f0000003c40)={&(0x7f0000003bc0)=ANY=[@ANYBLOB='X\x00V\x00', @ANYRES16=0x0, @ANYBLOB="00042dbd7000fbdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="3c0002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB], 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, 0x0, &(0x7f0000000000)) r2 = request_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000040)='\x00', 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, 0xfffffffffffffffc, 0x1) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) 17:10:55 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000000)=0xd000) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 17:10:55 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0x8, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x38}}, 0x4004000) socket(0x1d, 0x0, 0x9) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/63, 0x0, 0x3f}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') 17:10:55 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x2, 0x7, 0x4, 0x3}}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/182, 0xb6}}, 0x10) 17:10:55 executing program 5: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000000)="263666450f382203400f01cac422d9b7d8400f322ef30fc77300450f01c5360f01cf0f01fb0f080f20d835080000000f22d8", 0x32}], 0x1, 0x10, &(0x7f0000000080)=[@cr0={0x0, 0x1}], 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r2, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gre0\x00'}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @private=0xa010101}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x4040885) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) getsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x0) keyctl$link(0x8, 0x0, 0xfffffffffffffff8) socket$nl_audit(0x10, 0x3, 0x9) 17:10:55 executing program 1: ioctl$CHAR_RAW_SECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000000)=0x8) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/57, 0x0, 0x39}, 0x20) write$rfkill(0xffffffffffffffff, &(0x7f0000000040)={0xa4, 0x6, 0x11}, 0x8) 17:10:55 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = gettid() syz_open_procfs(r1, &(0x7f0000000540)='fdinfo/3\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000040)={0x454, 0x3f3, 0x200, 0x70bd29, 0x25dfdbff, {0x6, 0x0, 0x11, [0x0, 0xbcb0, 0xfffffffa, 0x1, 0xffffffff, 0x7, 0x3, 0x1, 0x80000000, 0x6, 0x3, 0xf7, 0x2d, 0xffff, 0x20, 0x2, 0x7, 0x4, 0x400, 0x101, 0x20, 0x0, 0x1, 0x0, 0xd02, 0x3, 0x1, 0xfffffffe, 0x0, 0x0, 0xffff, 0x2, 0x0, 0x20000, 0x6, 0x27, 0x6, 0x400, 0x6, 0x5e, 0x6, 0x3f, 0x7ad, 0x8, 0x6, 0x1, 0x800, 0x1f, 0x6, 0x3, 0x1, 0x8, 0xffff, 0x8000, 0x9, 0x0, 0xff, 0x4, 0x200, 0x5, 0xf7, 0x38, 0xddb, 0x70f], [0x0, 0x1, 0xfffffffe, 0xd728, 0x2, 0x7, 0x3, 0xff, 0x1, 0x120e, 0x3f, 0x2, 0x2, 0x7f, 0x8, 0x1, 0x7, 0x800, 0xfffffffb, 0x5, 0x800, 0x6, 0x3, 0x1, 0x745, 0x7, 0x101, 0xffff7fff, 0x2, 0x0, 0x8, 0x4, 0x7ff, 0x0, 0x8, 0xff, 0x3ff, 0x8, 0xdb, 0x0, 0x2, 0x6, 0x2, 0xf21, 0x6, 0x3, 0x40, 0x1, 0x8, 0x2, 0x6, 0x0, 0x3f6, 0x5, 0x40, 0x7, 0xd7f, 0x63, 0x7, 0x9, 0x7fffffff, 0xfff, 0xffff, 0x4], [0x80000000, 0x10000, 0x6, 0xffff, 0x3, 0x3e9e, 0x1, 0x3, 0x3, 0x6c7, 0x5, 0x200, 0x401, 0x8, 0x838b, 0xabc9, 0x3ff, 0x1, 0x6, 0x9, 0x1, 0x5, 0x7, 0x5, 0x5, 0x9, 0x20, 0x9, 0xffffffc1, 0x5e, 0xfff, 0x20, 0x80000001, 0x5, 0x9, 0x7, 0x971, 0x8, 0x3, 0x1, 0x80000000, 0x6, 0xcb6, 0x804, 0x9, 0x1ff, 0x40000, 0x7ff, 0x1ffc, 0x6, 0x0, 0x81, 0x82, 0x400, 0x9, 0x1c85ff0c, 0x0, 0x101, 0x63, 0x5, 0x80000000, 0x80, 0x8, 0x1], [0x0, 0x200, 0x7ff, 0x2, 0x8001, 0x7, 0x81, 0x60e, 0x2, 0x80, 0xbc, 0x1ff, 0x4c, 0xff, 0xfffffff7, 0x6, 0xfffffffc, 0x7fffffff, 0xff, 0x0, 0x5d5d9455, 0x7, 0x8000, 0x6, 0x5, 0x5280000, 0x31, 0x2, 0x1, 0x5, 0xffff7fff, 0x6, 0x2, 0x2, 0x0, 0x2f, 0xa000000, 0x6, 0x2, 0x1, 0xffffff00, 0x3, 0x5, 0x7f, 0x101, 0x1, 0x73c, 0x9, 0x1, 0x7fffffff, 0x81, 0x26e, 0x8, 0x10001, 0x7e, 0x100, 0x3, 0x83f, 0x1, 0x1f, 0x9, 0x74, 0x8, 0x7], 0x33, ['})#$[-&\\*+\'.[.-}:\'\x00', '\x00', '\x00', '!,&\\!\':%-++!)\x00', '((%\x00', '\x00', '&/&&$#!\x00', '\'$\x00']}, ["", "", ""]}, 0x454}, 0x1, 0x0, 0x0, 0x4000011}, 0x20040044) socket(0x9, 0xa, 0x1) 17:10:55 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6}, 0x10) 17:10:55 executing program 5: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0xffffffffffffffaf, 0x3b, 0xffffffff}, 0x20) 17:10:55 executing program 4: socket(0x4, 0x0, 0x9) 17:10:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:10:56 executing program 2: socket$l2tp6(0xa, 0x2, 0x73) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x581000, 0x0) write$tcp_mem(r0, &(0x7f0000000040)={0x0, 0x20, 0x5, 0x20, 0x5e84}, 0x48) 17:10:56 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b, 0x40000}, 0x20) socket$alg(0x26, 0x5, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/arp\x00') write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000002c0)={0xa, 0x4}, 0xc) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000040)=0x6, 0x4) r3 = socket$l2tp6(0xa, 0x2, 0x73) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x400, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x80}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x400}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xab6a}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x9}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x440c1) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/tcp\x00') ioctl$CHAR_RAW_GETSIZE64(r5, 0x80081272, &(0x7f0000000340)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r3}) 17:10:56 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/56, 0x0, 0x38}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@newchain={0x44, 0x64, 0x800, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x10, 0xfff8}, {0xffff, 0x3}, {0xc, 0xffed}}, [@TCA_RATE={0x6, 0x5, {0x5, 0x9}}, @TCA_CHAIN={0x8}, @TCA_CHAIN={0x8, 0xb, 0x9b4}, @TCA_CHAIN={0x8, 0xb, 0xf391}]}, 0x44}, 0x1, 0x0, 0x0, 0x24004880}, 0x48005) 17:10:56 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x84) 17:10:56 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/81, 0x0, 0x51}, 0x20) 17:10:56 executing program 3: r0 = semget$private(0x0, 0x2, 0x200) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000000)=""/66) 17:10:56 executing program 4: socket(0x1d, 0x0, 0x8) 17:10:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:56 executing program 2: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8ab307ac5d5d029b}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x2c, r0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc004080}, 0x40000) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000580)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/49, 0x0, 0x31, 0x8}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x16c}, 0x1, 0x0, 0x0, 0x44010}, 0x20010840) accept$alg(r4, 0x0, 0x0) 17:10:56 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001a00000128bd7000fcdbdc250000ff0700000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/72, 0x0, 0x48}, 0x20) r1 = shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffe000/0x2000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x2000) 17:10:56 executing program 4: connect$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0xf5, 0x0, 0x1, 0x1, 0x6, @remote}, 0x14) socket(0x9, 0x4, 0x2) 17:10:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:56 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0x4000}, 0x20) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) 17:10:56 executing program 4: r0 = socket(0x1d, 0x0, 0x9) bind$bt_sco(r0, &(0x7f0000000140)={0x1f, @none}, 0x8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7fff}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x400}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 17:10:56 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) 17:10:56 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = gettid() syz_open_procfs(r0, &(0x7f0000000000)='net/icmp6\x00') 17:10:56 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x1f}, 0x20) r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card2/oss_mixer\x00', 0x400400, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) connect$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x1b, r1, 0x1, 0x13}, 0x14) write$proc_mixer(r0, &(0x7f0000000040)=[{'RADIO', @void}, {'RECLEV', @void}], 0xd) 17:10:56 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x4000}, 0x40040) 17:10:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = accept$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000240)=@req3={0x2, 0x6, 0x2, 0x7, 0x0, 0x3, 0xfffffff8}, 0x1c) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x601, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) connect$packet(r2, &(0x7f0000000180)={0x11, 0x15, r3, 0x1, 0x7, 0x6, @local}, 0x14) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:56 executing program 4: socket(0x1d, 0x0, 0x9) socket$inet(0x2, 0x1, 0x800) socket$inet_udp(0x2, 0x2, 0x0) 17:10:56 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xffffff71, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) bind$bt_sco(r0, &(0x7f0000000680), 0x8) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x141000, 0x0) recvmsg$kcm(r2, &(0x7f0000000640)={&(0x7f0000000180)=@can, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)=""/2, 0x2}, {&(0x7f0000000240)=""/18, 0x12}, {&(0x7f0000000280)=""/226, 0xe2}, {&(0x7f0000000380)=""/127, 0x7f}, {&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000500)=""/24, 0x18}, {&(0x7f0000000540)=""/9, 0x9}], 0x9}, 0x123) 17:10:56 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@func={0x2, 0x0, 0x0, 0xc, 0x5}, @union={0x6, 0x5, 0x0, 0x5, 0x0, 0x6, [{0xfffffffd, 0x4, 0x4}, {0x5, 0x3, 0x2ef}, {0x7, 0x2, 0x4}, {0x7, 0x2, 0x9}, {0x7, 0x4, 0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000080), 0x6f}, 0x20) 17:10:56 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/54, 0x0, 0x36, 0xffffffff}, 0x20) 17:10:56 executing program 4: socket(0x4, 0x800, 0x9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x300, 0x70bd2c, 0x25dfdbfb, {0x1, 0x1}, ["", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) 17:10:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:10:56 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/47, 0x0, 0x2f}, 0x20) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='mountstats\x00') r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000500)={0x13, 0x10, 0xfa00, {&(0x7f0000000300)}}, 0x18) getsockopt$inet_dccp_int(r2, 0x21, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x4) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r4, 0x0, 0x0}, 0x10) getsockopt$bt_sco_SCO_OPTIONS(r4, 0x11, 0x1, &(0x7f0000000180)=""/160, &(0x7f00000000c0)=0xa0) ioctl$CHAR_RAW_RESETZONE(r1, 0x40101283, &(0x7f0000000080)={0xe, 0x3}) ioctl$CHAR_RAW_SECDISCARD(r1, 0x127d, &(0x7f0000000040)=0xfffffffffffffffd) 17:10:56 executing program 5: sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x90}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x81}]}, 0x60}, 0x1, 0x0, 0x0, 0x20008880}, 0x2004000) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000140)=0x1) 17:10:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000000)=""/165, 0xa5, 0x12021, &(0x7f00000000c0)={0x11, 0x1b, r1, 0x1, 0x87, 0x6, @dev={[], 0x1e}}, 0x14) write$char_raw(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/10240], 0x2800) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo\x00') ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f0000000200)) 17:10:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40002, 0x0) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x14, 0x100000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps\x00') getsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f0000000100)=""/194, &(0x7f0000000200)=0xc2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:10:56 executing program 2: r0 = getuid() r1 = socket$nl_generic(0x10, 0x3, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000b00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000880)={0x1e8, 0x0, 0xe8e74ceaa22abd54, 0x70bd25, 0x25dfdbfc, {}, [{{0x8}, {0x1cc, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0x997, 0xc6, 0x9, 0x9}, {0x4, 0x2a, 0x1, 0xa02}, {0x7, 0x81, 0xbd, 0x5}, {0x7f, 0x0, 0x3, 0x1b3c}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3b4}}}]}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x894}, 0x85) r3 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$get_persistent(0x16, r0, r3) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:56 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r2, 0x0, 0x0}, 0x10) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x453, 0x200, 0x70bd2a, 0x25dfdbff, "7a9b7e351373feddf2957c0f9bb20c67d9e3f38ce710d2923dbd4be1ca58fd9dfcdc85c19f13c13cf63d7d", ["", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x1) socket(0x1d, 0x0, 0x9) 17:10:56 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x800) keyctl$update(0x2, 0x0, &(0x7f0000000240)="2912f47e91ae17221d68e1f61b5a8332fcb9767c98bdf83741c46a2390f1206aba387dfae10eb7bbc0a3f5db1aa946c769791c2ddb7836f6a65ac2e572142cf69f2b8ac5611b276a8fd04dfabe80fd10545e1b43e9c7e3ac7145d702e37defc13b5f60d8d825f4855f8c4c2baaf891905163d3d8f438bf1281a3ef87b4111b4ae83c8353e989ff18c59217b25af4ffd5075a1f01a651f311779446a323054874801002fe3c7347e36af994b5fd5a3491aaabcc0f2f8d3067b31f925e0d04b7499a305c93fd7a449a13b8b06c9240254df7ca329c0f1684f9f0df87b8", 0xdc) sendmsg$AUDIT_TRIM(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f6, 0x100, 0x70bd2a, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80000) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xc690010}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x3f7, 0x1, 0x70bd29, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4040810}, 0xc000) [ 601.940209] device batadv_slave_1 entered promiscuous mode [ 601.965481] device batadv_slave_1 left promiscuous mode [ 601.984174] device batadv_slave_1 entered promiscuous mode 17:10:56 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) [ 602.025479] device batadv_slave_1 left promiscuous mode 17:10:56 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4ab9b1130d93ae26}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x44010) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000000)) 17:10:56 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/68, 0x0, 0x44}, 0x20) 17:10:56 executing program 4: r0 = socket(0x1d, 0x0, 0x9) syz_open_dev$char_raw(&(0x7f0000000080)='/dev/raw/raw#\x00', 0x1, 0x4600) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) 17:10:56 executing program 3: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x6}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x80}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_ENCAP_TYPE={0x6}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040008}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:56 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0x1000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000280)={&(0x7f00000000c0)=[0x0], 0x1, 0x800, 0x0, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82018}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x64, r3, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_hsr\x00'}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x11) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000006c0000006c00000006000000000000000000000a00000000020000000000000c020000000200000005000005050d00000c00000003000000070000000f00000002000000010000000a000000040000004eee3c640100000004000000010000000e000000040000000900000010000000000000020100000000305f302e00"], &(0x7f0000000180)=""/185, 0x8a, 0xb9, 0x1}, 0x20) socket$l2tp6(0xa, 0x2, 0x73) 17:10:57 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/64, 0x0, 0x40, 0x2}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x28}, 0x10) 17:10:57 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/62, 0x0, 0x3e, 0xffffffff}, 0x20) 17:10:57 executing program 4: r0 = socket(0x25, 0x2, 0x515) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg0\x00'}) syz_usbip_server_init(0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @generic={0x31, "2256d239cbc9c69d76696d12c227"}, @l2={0x1f, 0x9, @fixed={[], 0x10}, 0x0, 0x2}, @can, 0x7ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='veth1_virt_wifi\x00', 0x7, 0x0, 0x5}) 17:10:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="6a2d61c31529f29ae55b49831cf21f3bb25c4e3f55c4f97f6323a5a91bec3169d50905d8b76b8aa644db26fc584655fcf636fb6ad36183108d5d38fa3bd968580088853087cce8683f94a540038798ff8bf18befe69f5cb327c59d9625e3f2e335b355e18039032f438230c2146ae5bab9bd9ef3e7851c4dd37afe07ec185caadd50b650994992834cfe3f342e61ac6ff7ba6de6fd7ab8f6748b7877f86665113e45b7554eccf152f7a85cdd5485d5de8461768db25c373c075c33fbd537cc", 0xbf) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) 17:10:57 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000180)={0x0, "fe6789b981cee84deeb3b50f7b68425d8df01f9228663a70855272b86de4e1fb6d0decce57fa2e6a5ca51244d41901a63c8d8ca058315d0c02cd1ad9c460e2d6", 0x2f}, 0x48, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f0000000200)='%(\xfb!*/}-#$).\x00') 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x80, 0x3ed, 0x2, 0x70bd26, 0x25dfdbff, "cf4f702536ddf5449f45d9c390697056fcd3b540b98486f9be0c7ccd3ba068c5ac332a6ae218d8dbf2ddbab4803173cc40834b52b9076b7e5893eeade19f861f8a5addca635f59d9dc1cad7bd2ebf1519bdf40a52b9476e37126310cb7a87828170348d3abc00dd52d3cd53dccc6f9c0", [""]}, 0x80}, 0x1, 0x0, 0x0, 0x200c811}, 0x20040880) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x6, 0xc889, 0x7, 0x20, 0x8, 0x1], 0x6, 0x40800, 0x0, 0xffffffffffffffff}) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3f6, 0x2, 0x70bd25, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x8001}, 0x8000) 17:10:57 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000000)=0x5, 0x4) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 602.326933] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 602.332772] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) 17:10:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0x3ff, 0x1, 0x2}, 0x8) ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000040)=0x2000) [ 602.409088] vhci_hcd: connection closed [ 602.409290] vhci_hcd: stop threads [ 602.446580] vhci_hcd: release socket 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) 17:10:57 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000180)={r6, 0x1, 0x6}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000180)={r11, 0x1, 0x6}, 0x10) socket$packet(0x11, 0x2, 0x300) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a80)={&(0x7f0000000440)={0x628, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xbc, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r0}, {0xc4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x2}, {0x8, 0x4, 0xa6c}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0x48, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x2a24, 0x8, 0x1, 0x101}, {0x5, 0x20, 0x7, 0xfffffc03}]}}}]}}]}, 0x628}, 0x1, 0x0, 0x0, 0x800}, 0x8000) 17:10:57 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/58, 0x0, 0x3a}, 0x20) [ 602.460874] vhci_hcd: disconnect device 17:10:57 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfc}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x1) 17:10:57 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket(0xb, 0x6, 0x5f9a) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) [ 602.513741] device batadv_slave_1 entered promiscuous mode [ 602.534504] device batadv_slave_1 left promiscuous mode 17:10:57 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000040)="5595eb432cd213496cb00b36040c0f83506f2a3fc56852a9f57280ab37710265d72162ace3a14c0fc8c6c5c258a434c7bba9a483d7f8a20bab6eb836f0085a1aa24434e3554fff18aa40a800639cb076d124c8e3554bfd79f1544ebec6291527a0b557a2e8e0", 0x66) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x1, 0xffffffffffffffff, 0x30, 0x755b635c9022bc13, @in6={0xa, 0x4e22, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}}}, 0xa0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/60, 0x0, 0x3c}, 0x20) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f00000000c0)=[0x3104, 0x9, 0xfff, 0x40, 0x8], 0x5, 0x800, 0x0, 0xffffffffffffffff}) semget$private(0x0, 0x3, 0x100) write$tcp_mem(r1, &(0x7f0000000180)={0x2, 0x20, 0xeefb, 0x20, 0x200}, 0x48) [ 602.563380] device batadv_slave_1 entered promiscuous mode [ 602.589743] device batadv_slave_1 left promiscuous mode 17:10:57 executing program 4: socket(0x30, 0xa, 0x9) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000040)) 17:10:57 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x808, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x2d}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1ff}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4800}, 0x48084) 17:10:57 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20c800, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x125f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') 17:10:57 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x6}}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) accept$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$CHAR_RAW_IOOPT(r1, 0x1279, &(0x7f0000000280)) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="e1d621b2cdb7f809220e999676cc51ef50e805cfd6554b94f8d96a3ec9bf6ab766c4a298603e69e9d7a66aebcff89253d7c15ef3d3f1a41c4a1af3ecb05163457e9a4f6ee31d7f77b883e323c54ab6bbf284fc", @ANYRES16=r2, @ANYBLOB="000029bd7000ffdbdf251200000006002800040000000a0009000180c2000000000008003b00ff7f000005002e0000000000050038000000000005002e0000000000050030000000000008000300", @ANYRES32=0x0, @ANYBLOB="08002b000100000005002d0000000000"], 0x68}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) 17:10:57 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='limits\x00') sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000240)={0x448, 0x3f4, 0x100, 0x70bd27, 0x25dfdbfd, {0x1, 0x0, 0x2c, [0x1, 0x200, 0x8, 0x10001, 0x80, 0x57, 0x40, 0x1f, 0x8, 0x3, 0x3, 0x6, 0x6, 0xff, 0x7, 0xffffff7f, 0xabe631b7, 0x0, 0x6, 0x10000, 0x4, 0x578, 0x7, 0x100000, 0x4, 0x8, 0x10001, 0x3, 0x9, 0x6, 0x6, 0x7, 0xfffffffc, 0x1283b4fd, 0xce, 0x10000, 0x9, 0x4, 0xffff, 0x8, 0x7fff, 0x3, 0x20, 0x2, 0x3, 0x5, 0x6, 0xee45, 0x5b, 0x3, 0x200, 0xfe000, 0x1000, 0x1000, 0x1, 0x81, 0x7, 0x9, 0x8, 0x4, 0xfc, 0xfff, 0x7, 0x7], [0x84, 0x10000, 0x9, 0x7, 0xfffffff9, 0x1f, 0x7fff, 0xfff, 0x3f, 0x10001, 0xc3, 0x0, 0x62, 0x8, 0x3, 0x7, 0x8, 0x8, 0x1, 0x40, 0x0, 0xfffffffd, 0xe3, 0x4, 0xff, 0x4, 0x1, 0xf2c, 0x0, 0x1ff, 0x80000001, 0x10001, 0x10001, 0x2, 0x2, 0x400, 0x7, 0x350e, 0x7, 0x6, 0xfffff2e2, 0x4, 0x10000, 0x5, 0x6, 0x3d5, 0x9cb7, 0x40, 0x1, 0xfea3, 0x9, 0x8001, 0xcd8, 0x7, 0x3, 0x6, 0x1, 0x10000, 0x15, 0xff, 0x414139af, 0x20, 0x6, 0x1000], [0xff, 0x302, 0x2, 0x80000001, 0xffffffff, 0x400, 0x4, 0x5, 0x0, 0x97ec, 0x10001, 0x2, 0x8, 0x2, 0x3f, 0x4, 0x80000001, 0x98, 0x2, 0x703a, 0x8c, 0x3, 0x45c, 0x7, 0xebe, 0x0, 0x8000, 0x5, 0xffff, 0xea85, 0x9, 0x9e, 0x8001, 0xfffffffb, 0xbf5, 0x0, 0x20000000, 0x1f, 0x6, 0x4, 0xdb, 0x0, 0x9, 0x401, 0x3, 0x0, 0x8, 0x8, 0x2, 0x80000000, 0x3, 0x6, 0x90c, 0xffff, 0x3, 0x1, 0xfffffff7, 0x4ecf, 0x3, 0x0, 0x1ff, 0x2, 0xffffffc0, 0x1], [0x9, 0xda, 0x9, 0x429, 0x6, 0x7fffffff, 0x5, 0x401, 0x28, 0xffff, 0x1, 0x5, 0x7, 0x7f, 0x40, 0x28, 0x1, 0x1523056f, 0x10000, 0x1, 0x8, 0xc4, 0x8, 0x7fffffff, 0x0, 0xc000000, 0x6, 0x2b, 0x0, 0x3f, 0x7fffffff, 0xfffffffd, 0xfff, 0x7, 0x9, 0x42, 0x4, 0x1, 0xb0, 0x9, 0xd25, 0x1ff, 0x5, 0xfc78, 0x7fff, 0x100, 0xfffffffd, 0x0, 0x4, 0x8, 0x3e1, 0x6, 0x2, 0x81, 0x9, 0x9, 0x80000001, 0x2, 0x87d3, 0x40f485d6, 0x3, 0x0, 0x1f, 0x3f], 0x25, ['limits\x00', 'limits\x00', 'l2tp\x00', 'l2tp\x00', 'l2tp\x00', '([[{\x00', '\xd3{\x00']}, ["", ""]}, 0x448}, 0x1, 0x0, 0x0, 0x4}, 0x4000080) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000840)={'wg2\x00', 0x0}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6}, 0x10) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000180)={r7, 0x1, 0x6}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000880)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000180)={r11, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000f80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000f40)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="48050000", @ANYRES16=0x0, @ANYBLOB="08042bbd7000fbdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="f40002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400ff03000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="780002803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="000202803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000008000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f72740000000000000000005600000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000400000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000000000008000100", @ANYRES32=0x0, @ANYBLOB="6401028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000500000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000800000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000101000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000100000008000600", @ANYRES32=r11, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000005000300030000000800040000100000"], 0x548}, 0x1, 0x0, 0x0, 0x10}, 0x81) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="654e88a1a29c126c46ea2efadc640715f4effee7ec4a3b90ffcbd8fefcf78997936d8e76f299510b81dcf25ad9cbcee59892113841b56ccbc8c0960745e80de7e674d627d82f0f6eec24e2e3242d2bca3028ac64ec0642b57958c000c7ad65068c264f7ac44e9b200553cb9c42a9ee71d6b9b1f11dbd54e5efcc88515dc11c8e11b6e0e7e27f1649d5e626bc32375bab48f37242f6c21ced49165fd9c3079b3240ac70ac3b253e1ef774fd6bc7a809664d", @ANYRES16=r1, @ANYBLOB="010026bd7000ffdbdf250700000008001800e0000002"], 0x1c}, 0x1, 0x0, 0x0, 0x24004080}, 0x8041) [ 602.906489] vhci_hcd vhci_hcd.0: port 1 already used 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) semget(0x1, 0x3, 0x200) [ 602.964707] device batadv_slave_1 entered promiscuous mode [ 602.980086] device batadv_slave_1 left promiscuous mode [ 602.993918] device batadv_slave_1 entered promiscuous mode 17:10:57 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4, 0x1, 0x88, 0x1f}, {0x200, 0x1f, 0x6, 0x8}]}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000280)=0x14) recvfrom$packet(r0, &(0x7f0000000200)=""/25, 0x19, 0x40, &(0x7f00000002c0)={0x11, 0x10, r2, 0x1, 0x2d, 0x6, @broadcast}, 0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r4, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7fff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x400}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x7}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x84) 17:10:57 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x5, 0x1, 0xffffffff], 0x3, 0x800}) 17:10:57 executing program 4: r0 = socket(0x1d, 0x0, 0x9) setsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000000)="bda1f06990ea98dfadb860b670c65d0044a1da8ce6a26cb4ac6875f60a4b7edde04dbbca9c02b1f622349c695e180ce7697298a6", 0x34) [ 603.023916] device batadv_slave_1 left promiscuous mode 17:10:57 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x3f9, 0x200, 0x70bd2c, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:57 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getegid() 17:10:57 executing program 1: getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/67, 0x0, 0x43}, 0x20) 17:10:57 executing program 3: bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:57 executing program 4: getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) socket(0x1d, 0x0, 0x9) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000080)={0x5, 0x20, 0x40, 0x20, 0x6}, 0x48) 17:10:58 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0x100, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x4005) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x20}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44880}, 0x40) write$sysctl(r0, &(0x7f0000000040)='2\x00', 0x2) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:58 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/59, 0x0, 0x3b, 0x40000000}, 0x20) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x50, r0, 0x20, 0x70bd26, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x400}]}, 0x50}}, 0x20000050) 17:10:58 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_FD={0x8, 0x17, @udp6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x30008010) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x64, r0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private2}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xd}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xc4}]}, 0x64}, 0x1, 0x0, 0x0, 0x8001}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x20040801) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:58 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_GETSIZE64(r0, 0x80081272, &(0x7f0000000000)) keyctl$restrict_keyring(0x1d, 0xffffffffffffffff, &(0x7f00000005c0)='user\x00', &(0x7f0000000600)='+@\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x430, 0x3f4, 0x4, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x20, [0x2, 0x5, 0x1, 0x3, 0x7, 0x2, 0x68, 0x2, 0x8001, 0x1, 0x200, 0x0, 0x80, 0x5, 0x4, 0x9, 0x800, 0x1ff, 0xf0, 0x36, 0x81, 0x8001, 0x48, 0x5, 0x0, 0x3, 0x207, 0xfffffffb, 0xd60, 0xfff, 0x1, 0x1de1, 0xe5, 0x8, 0xfff, 0x2, 0x2, 0xff, 0x0, 0x3, 0x2, 0x0, 0x3, 0x2, 0x401, 0x5f6e5106, 0x400, 0x101, 0xffff, 0xa7, 0x10001, 0x4, 0x1, 0x3, 0x3, 0x1ff, 0x0, 0x706, 0x3, 0xc67c, 0x3, 0x4914, 0x2], [0x59eb, 0x7, 0x5, 0x1, 0x3, 0xd98, 0x6, 0x3f, 0x40, 0x1, 0x5, 0x4, 0x98, 0x8, 0x36, 0x100, 0xd7, 0x40000000, 0x8, 0x4, 0x6, 0xfff, 0x4, 0x80000001, 0x1, 0x93, 0x7ff, 0x7, 0x8, 0x1, 0x7f, 0xfffffffe, 0x3, 0xf89, 0xe000, 0x1, 0x9, 0x0, 0x81, 0x10001, 0x6, 0x9, 0x3, 0x6, 0x401, 0x67ad40e7, 0xfffffff7, 0x6, 0x1, 0x9b5, 0x7, 0xfffff801, 0x59, 0x9, 0x10001, 0x100, 0xb3e, 0x478, 0x0, 0x1f, 0x5, 0x7ff, 0x9, 0x7fffffff], [0x1f, 0x4, 0x1, 0x2, 0x8, 0x5, 0x8, 0x9, 0x10001, 0xd4, 0x1, 0x8000, 0x0, 0x7, 0x100, 0x7ff, 0x6, 0x5, 0x9, 0x4, 0x2beb, 0x3, 0x9, 0x1, 0x1, 0xffffffc0, 0xfffffffc, 0x800, 0xfffff801, 0x3ff, 0xffffffff, 0xfffffffa, 0x101, 0x8d, 0x4, 0xfff, 0x9, 0x10000000, 0x3, 0xd0, 0x9, 0x7, 0xffffffff, 0x7, 0x6, 0x1000, 0xdf, 0x81, 0x6, 0x2, 0x7f, 0x8, 0x3, 0x7, 0x200, 0x7, 0x655e, 0x800, 0x7, 0x8, 0x8, 0x3, 0x2, 0x7fff], [0x2, 0x2, 0xbd9, 0x4, 0x9, 0x3, 0x0, 0x2, 0x99, 0xf7, 0x8001, 0x800000, 0x3, 0x9dc9, 0x653, 0x6, 0xffffffc1, 0x2, 0x9, 0x10001, 0x6, 0x8000, 0xffffffff, 0x200, 0x800, 0x26aa0000, 0x6, 0x8, 0x3, 0x7fff, 0x2, 0x600000, 0x5, 0x0, 0x40, 0xfffffffc, 0x1, 0x4, 0x19, 0x3, 0x0, 0x2000200, 0xff, 0x10001, 0x7946f47b, 0x5, 0x22f, 0x5, 0xffffff21, 0x1424, 0x7, 0x3, 0x9, 0x4, 0x7, 0x2, 0x3ff, 0x4c, 0x10001, 0x121, 0x80000001, 0x1, 0x7, 0x9], 0xf, ['/dev/dlm_plock\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x8050}, 0x48001) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) accept$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x40000) 17:10:58 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x3f7, 0x20, 0x70bd27, 0x6, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) r1 = socket(0x1d, 0x0, 0x9) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000)=0x3, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 17:10:58 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000000)=0x3) 17:10:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='map_files\x00') 17:10:58 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES32=r0], &(0x7f0000000180)=""/251, 0x4a, 0xfb}, 0x20) r1 = socket(0x21, 0x2, 0x1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r2, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3f}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}]}, 0x44}, 0x1, 0x0, 0x0, 0x4045}, 0x2400c040) 17:10:58 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={0xffffffffffffffff, r0}) 17:10:58 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000180)={r5, 0x1, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wg1\x00', 0x0}) r8 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r10, 0x107, 0x1, &(0x7f0000000180)={r9, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21512240}, 0xc, &(0x7f00000008c0)={&(0x7f0000000400)={0x4ac, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r0}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xd0}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r7}}}]}}, {{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0xc97}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r9}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x4ac}}, 0x10) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) 17:10:58 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7", 0x1a}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r1, 0x0, 0x0) r2 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r2, 0x0, 0x0) keyctl$unlink(0x9, r1, r2) keyctl$search(0xa, 0x0, &(0x7f0000000080)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, r0) 17:10:58 executing program 4: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x280000, 0x8, 0x9, 0x7, 0xe, 0x1, 0x200}, 0x1c) r0 = socket(0x1d, 0x0, 0x9) keyctl$negate(0xd, 0x0, 0x0, 0xfffffffffffffffc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001840)={r0}) accept4$alg(r1, 0x0, 0x0, 0x1000) socket(0x9, 0x3, 0x6) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r2, 0x93, 0xaa}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'blake2s-160-x86\x00'}}, &(0x7f0000000180)="4e225db59d08000031839b71963af8f2a2b673344fd67feafab46c7d81a7fe832c8fb780de6ef06a295e995c6ae0f4a7132fa8c42115ffe1901bc7833d35a5f87f14572a7353b59ce52543a0790802d57256dd9b61dce10dc3d0b65ab78febe06c554e4ac666293dbcf6f7982e28a0b7ba00c6d41b24d4fafcf3b2c0e0081b7c0924d3e017cb3def6725489ca5a7c1bd9c2978", &(0x7f0000000240)="1d376e26d65e834d415f6c0a368c5bc03fea352af1bf89aa62552b2cf6946c7d89df9b0fae0e7dacb2064f2941b8bacf8f756036ae8359a61f4855f1db7c4e3037fff1785fd84508c9924e3a0e66b0be7ddc8d314d3167e421025bb418b69d7fdce1fd87ed42e42978cb8493859d17faafb980b9635b05ac7612c5681dcdf88a49de588ee29138d8620e22a29d187e23c4470368066f63a5fd577b16cc8248a24abfdc29a7836941a522") 17:10:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) accept$packet(r1, &(0x7f0000000000), &(0x7f0000000080)=0x14) 17:10:58 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xd6c5a9f3911fd67b, 0x0) 17:10:58 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40140, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x50, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x4}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={[], [], @broadcast}}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x24048040}, 0x20000004) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:58 executing program 4: socket(0x1d, 0x1, 0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x140, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x20010) 17:10:58 executing program 2: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x50, r0, 0x4, 0x4, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x40}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x3351}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x50}}, 0x4008810) syz_usbip_server_init(0x3) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/65, 0x0, 0x41, 0x3}, 0x20) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x94, 0x464, 0x200, 0x70bd2b, 0x25dfdbfe, "46a410163a808b7067f4c88cf14a8fed6e10c25716b417472514f979c9b8c0547c0599c250b1b844ef632594ebc98a6b321f16975d3d710eb7e73e7346eb7719c771e63fec5a19420c844a7e521d93c3dc9011866d9717325572bd5b9995efe6d6fab6ff6782f4c336ee0bbc29ac4d7d49e09e938418fab71079738be399022cfde13e72", ["", "", "", "", ""]}, 0x94}, 0x1, 0x0, 0x0, 0x40000}, 0x4051) [ 603.524815] device batadv_slave_1 entered promiscuous mode [ 603.552398] device batadv_slave_1 left promiscuous mode [ 603.564640] device batadv_slave_1 entered promiscuous mode 17:10:58 executing program 0: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1010}, 0x1, 0x0, 0x0, 0x40}, 0x4000080) r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x10b36837}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfffffffa}]}, 0x3c}}, 0x20000000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000011c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000001280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x40, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7e}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfff}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}]}, 0x40}}, 0x20000000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) getsockopt$packet_buf(r0, 0x107, 0x2, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) recvfrom$packet(r1, &(0x7f0000000080)=""/236, 0xec, 0x10000, &(0x7f0000000200)={0x11, 0x3, r2, 0x1, 0x6, 0x6, @multicast}, 0x14) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 603.611423] device batadv_slave_1 left promiscuous mode 17:10:58 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000080)=""/70, 0x0, 0x46}, 0x20) 17:10:58 executing program 1: ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 603.653421] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 603.659260] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 17:10:58 executing program 4: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, 0xffffffffffffffff, 0x20, 0x0, @ib={0x1b, 0xefc2, 0xb052, {"b505b88e81da41bb33014a6e451c73f7"}, 0x6, 0x9, 0x9}}}, 0xa0) r0 = socket(0x1d, 0x1, 0x101) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, 0x0, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffffd}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3144}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x30000000}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x48000}, 0x804) 17:10:58 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000080)=[0xfffff744, 0x0, 0x801], 0x3, 0x800, 0x0, 0xffffffffffffffff}) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000240)=""/105, &(0x7f0000000200)=0x69) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000000)="baf80c66b810931c8166efbafc0c66b8f0ffffff66ef66b9800000c00f326635008000000f300f229a0fc77133baa100ecea948671003667660f602c490f9d4e060f0666b91908000066b8db00000066ba000000000f30", 0x57}], 0x1, 0x8, &(0x7f00000002c0), 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x305800, 0x0) 17:10:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000280)=@req3={0x10000, 0x9, 0xffffffff, 0x9, 0x15f, 0x9, 0x80000001}, 0x1c) r1 = accept4$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x80000) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000240)=@req3={0x1cf, 0x2, 0x10001, 0xfffff44f, 0x3ff, 0xe0000000, 0xfffffff8}, 0x1c) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0x3], 0x2, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, [], 0x43}}, @L2TP_ATTR_CONN_ID={0x1, 0x9, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, [], 0x1}}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000021) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:58 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/35, 0x0, 0x23}, 0x20) [ 603.734891] vhci_hcd: connection closed [ 603.735062] vhci_hcd: stop threads [ 603.744245] vhci_hcd: release socket [ 603.763438] vhci_hcd: disconnect device 17:10:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 17:10:58 executing program 4: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x1eb0, 0xfffffc3a], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) connect$bt_sco(r0, &(0x7f00000000c0)={0x1f, @fixed={[], 0x11}}, 0x8) socket(0x1d, 0x0, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 17:10:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000000)) 17:10:59 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xd, &(0x7f0000000000)="3367375af94c19b49fe3ec66ff8eddd4a94707b4ef468f9057cdd6f9f8dac2479d558fd430c81c43034f4f368b0432ecdeff4bb37f0d11cb4862d825c9f7ee615ef91bc1f36478ede2d3bf99c178ea9e6ca81a7f6e602767119668973a190e3da44605f7dd49446533ff20085b70938d4b846e1bb0a815aa92828300dd7d89ef", 0x80) 17:10:59 executing program 5: openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x1a1400, 0x0) ioctl$CHAR_RAW_IOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0e391b25b8ce540386bdb9ce237e9d4766b646ab525010d409bd6d55444c73499e03253351218f7f9f40a622f2a6354c00b1b18f7a4ce45b8da9b0aa6cd60ca13f0b610f2e1a6cc1155b3d30715ab5f729b72b0e4324e0f59760d9218e3dcd5ede7ac51ba879729d9ce9698d60ea0c9cfa4aaac6ba552219ca79e1d414c0d165bb1f60e2c994fcffdc386fe69335602cb4d634bc9027bc28e2356644da4fef6a6394dbdc8adbe256635bfd226d1f91fc20777ef9d8ab21b8f25235b4120fd7cccd579cfc48cbc5ca001101fa0cfe00b9f0bb571b9e68d51affa8d73cfc1da1de4e65677c074cb31881f001a4c5", 0xed) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') read$rfkill(r1, &(0x7f0000000080), 0x8) 17:10:59 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x22140, 0x0) 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=""/68, 0x0, 0x44}, 0x20) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x44c, 0x3f3, 0x200, 0x70bd27, 0x25dfdbfd, {0x6, 0x0, 0x11, [0xcf, 0xfffffff7, 0x1ff, 0xffff, 0x23, 0x5, 0x6, 0xbe, 0x3, 0x3f, 0xffff8001, 0x6, 0x5, 0x5, 0x7, 0x401, 0x463, 0x3, 0xc08e, 0x2, 0x3, 0xff, 0x7ff, 0xfff, 0x6, 0x357, 0x4, 0x0, 0x0, 0x4678ace5, 0x7387369c, 0x8b, 0x0, 0x100, 0x6, 0x9, 0x1000, 0x4334, 0x2, 0x3, 0x9, 0x7da, 0x4, 0x400, 0x2, 0x5, 0x6, 0x7, 0x7, 0x7fff, 0xafb5, 0x7, 0x7, 0x10000, 0x926, 0x40, 0x8, 0x2, 0x8, 0x8000, 0xa2, 0xd92c, 0x7, 0x5], [0x7f, 0x5, 0x5, 0x10000, 0x401, 0xb09e, 0x4, 0x0, 0xd6, 0x2, 0x5, 0xc5, 0xffffffff, 0x7, 0x4e, 0x0, 0x43d, 0x5, 0x5, 0x2, 0x6, 0x1f, 0x8, 0x5, 0x8, 0x9, 0x8, 0x1, 0x3f, 0xff, 0x0, 0x8, 0x8, 0x3, 0xe45, 0x1, 0x7, 0x1, 0x8, 0x6, 0x53f, 0x2, 0x0, 0x3, 0xffff, 0x8, 0x6, 0xffff, 0x5, 0xc6, 0x1, 0x26, 0x7, 0x8b, 0x2, 0xa66, 0xaf40, 0xfffffffb, 0x3, 0x0, 0x3, 0x1ff, 0xc9af, 0x5], [0x3f, 0x0, 0x5, 0x200, 0x6, 0x9, 0xfc5f, 0x5, 0x10001, 0x7, 0x400, 0x7ff, 0xc08, 0x80000001, 0xfffffffc, 0x4, 0x3f, 0x3f, 0x2, 0x5, 0x8, 0xbe18, 0x1000, 0xff, 0x0, 0x400, 0x4, 0x7, 0x8, 0x7, 0x2, 0x9, 0x3ff, 0x8, 0x10001, 0x40, 0x10001, 0x8, 0xe9, 0x7, 0x8, 0xb0, 0xff, 0x6, 0x1, 0x3, 0xfffffff7, 0xfffffffc, 0x10000, 0x0, 0x4, 0x7a, 0x2, 0x9f, 0x5, 0x7, 0x9, 0x6, 0xffffffff, 0x6, 0x6, 0xfffffff7, 0x3, 0x310e], [0x9, 0x5, 0x9, 0x3, 0x200, 0x9, 0x0, 0xb55d, 0x6, 0x6, 0xfffffff9, 0x3, 0xfffff801, 0x8, 0xd0, 0x9, 0x10000, 0x6, 0x6, 0xbe, 0xff, 0xc681, 0x7, 0x7, 0x5, 0x2, 0xfff, 0x1, 0x0, 0xffffffff, 0x7a, 0x2, 0x2, 0x0, 0x5, 0x4, 0x7f, 0x5, 0x8, 0x8, 0x8001, 0x4, 0xffff6447, 0x1, 0x8, 0x386, 0x5, 0x4dd, 0xffff, 0x6, 0x1, 0xc0c0, 0x100, 0x8001, 0xff, 0x4, 0x8, 0x5, 0x1, 0x8, 0x81, 0x1, 0x5, 0x8], 0x2b, ['#+\x00', '%\x00', '[]\x12\x00', '*-]/\x00', '-\x00', '{--%{\x00', '#\xba:)\\(\x00', '$(,\'\\,@%r-(\x00', ',\x00']}, ["", "", ""]}, 0x44c}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000000) 17:10:59 executing program 4: r0 = socket(0x1d, 0x0, 0x9) sendmsg$AUDIT_TRIM(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x400, 0x70bd28, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004004}, 0x48054) 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x6, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="a40000006404000228bd70005a66b62094bcf488557089addbf5b36fe10fc12a7bf9c0fe6d996415f7523a2c114439ec2279f4950d69c866263b09fb6d6f5366200dc8a3bb4cb5ee1d854567620b9b7889ea5063a470818c06b196c250e42edbd7e0fb69c39884d6dc21223676dccd6944e67f090374603f3ec50dc33257457e2df17caff24e0d74aff2853e2a6900"/164], 0xa4}, 0x1, 0x0, 0x0, 0x8010}, 0x14) [ 604.236223] vhci_hcd vhci_hcd.0: port 1 already used 17:10:59 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x204000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='net/ipv6_route\x00') r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040), 0x4) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r0, 0x2}}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') r3 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000500)='/proc/asound/card2/oss_mixer\x00', 0x408200, 0x0) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f00000004c0)=0x5, 0x4) read$proc_mixer(r3, &(0x7f0000000540)=""/166, 0xa6) 17:10:59 executing program 1: add_key$fscrypt_v1(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc2='e355a76a11a1be18'}, &(0x7f0000000200)={0x0, "27e4f3c08373560972a7fbff212c5ae144446d7198997f5e57e9d42e62982283687151c176abff9862f95fa350ad9aa331ae65c19cc3ffe0af67f89ba3932c28", 0x30}, 0x48, 0xfffffffffffffffa) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="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", 0x1000) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x9}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'bond_slave_1\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001854}, 0x20004945) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000100)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) getsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000001480)=""/50, &(0x7f00000014c0)=0x32) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001340)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000001440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001400)={&(0x7f0000001380)={0x48, r4, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x100000000}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2e}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000040}, 0x8001) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f00000002c0)={&(0x7f0000000280)=[0x7, 0x4, 0x9, 0x0, 0xfffffffa], 0x5}) 17:10:59 executing program 2: keyctl$update(0x2, 0x0, &(0x7f0000000180)="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", 0xff) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) read$rfkill(r0, &(0x7f0000000040), 0x8) r1 = socket(0x8, 0x80000, 0x3a12d928) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000280)=""/138, &(0x7f0000000080)=0x8a) 17:10:59 executing program 4: r0 = socket(0x1d, 0x0, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) read$rfkill(r1, &(0x7f0000000080), 0x8) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f0000000580)={&(0x7f00000000c0), 0xc, &(0x7f0000000540)={&(0x7f0000000100)={0x440, 0x3f4, 0x4, 0x70bd28, 0x25dfdbfe, {0x6, 0x1, 0x30, [0x101, 0x5f0, 0x80000000, 0x6, 0x1ff, 0x1ff, 0x626, 0x7, 0xffffffff, 0x8000, 0x3, 0x6, 0x2f71, 0x1, 0x524, 0x800080, 0x2, 0x1000, 0x6, 0xfffffff9, 0x7, 0xa0, 0x0, 0x7fffffff, 0x49f, 0x9, 0x80, 0x1f, 0x995, 0x10001, 0xfffffffa, 0x1, 0x1, 0x0, 0x2, 0x7, 0x3, 0x1, 0x1ff, 0xa3, 0x0, 0x20, 0x1, 0x401, 0x7, 0x401, 0x4, 0x88c, 0x4000, 0x81, 0x8, 0xb9, 0x1, 0xe8, 0x8, 0x2, 0xd, 0xffffffff, 0x1, 0x9, 0xffffffe1, 0x3, 0x3, 0x3], [0x5, 0x8, 0x40, 0xff, 0x1, 0x20, 0x48b, 0x5, 0x80000001, 0x0, 0x1ff, 0x6, 0x1, 0x7, 0x16e, 0x3f, 0xfffffffc, 0x200, 0x7853, 0xdd, 0x9, 0x18, 0x5, 0x7, 0x5, 0x1, 0x6, 0x2b, 0x4, 0xfffff573, 0x5, 0x2, 0x5, 0x7, 0x3f, 0x7, 0x1, 0x3, 0xfffffff7, 0xa0000, 0x9ca5, 0x10000, 0x10001, 0xcdb, 0x4, 0x7, 0x9, 0x7, 0x8, 0x5, 0x8000, 0x2, 0x6, 0x3, 0x401, 0x5, 0x3, 0x1, 0x2, 0x400, 0x10000, 0x4, 0x1, 0x5], [0x5, 0x5, 0x8, 0x7ff, 0x1ff, 0x7, 0x2, 0x9, 0x5, 0xffffff1b, 0xc9b1, 0x6, 0x6, 0xffffffff, 0x2, 0x9, 0x1f, 0x6, 0x6120, 0x2, 0x80000001, 0x8, 0x1, 0x40, 0x1, 0xff, 0x2, 0x4, 0x3f, 0x3f, 0x5, 0x4, 0x9, 0x3, 0x2, 0xc3a7, 0x7, 0x10000, 0xe35, 0x7fff, 0x1, 0x0, 0xc32, 0x100, 0x81, 0xfff, 0x5, 0x3f, 0x0, 0x252, 0xfff, 0x7b, 0x4, 0x1ff, 0x8, 0x4, 0x1, 0x7, 0xfff, 0x7, 0x9d6d, 0x9, 0x8000, 0x8001], [0x5, 0x4, 0x3ff, 0x6, 0x81, 0x20, 0x7, 0x4, 0x82, 0x1, 0x7ff, 0xfffffff9, 0x0, 0x4, 0xffffff89, 0x100, 0x8, 0x401, 0x7fff, 0x3, 0x1fa7, 0x3, 0x1f, 0x1, 0x4b87, 0xfffffff9, 0x1, 0xd9c, 0x6, 0x0, 0x3, 0x6, 0x1ff, 0x20, 0x0, 0x80000001, 0x1, 0xcb, 0x100, 0x4, 0x4fa, 0x1, 0x8000, 0x871, 0xfffffffa, 0x2, 0x80000001, 0x55, 0x40, 0x7, 0x10000, 0xfffffffc, 0x0, 0xffff, 0x4, 0x8000, 0x2, 0xa7d, 0x80000001, 0xdce6, 0x8000, 0x1, 0x1658, 0x7f], 0x1e, ['morus1280-sse2\x00', '/dev/dlm_plock\x00']}, ["", "", "", "", "", "", ""]}, 0x440}, 0x1, 0x0, 0x0, 0x4}, 0x8844) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) 17:10:59 executing program 5: keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000000)='id_legacy\x00', 0x0) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x101, 0xfffffff7, 0x2, 0x10007ff, 0x800], 0x5, 0x80800, 0x0, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002fc0)={{{@in6=@private1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@private1}}, &(0x7f00000030c0)=0xe8) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000003100)={r2, 0x1, 0x6, @multicast}, 0x10) socket(0x1, 0x5, 0x2) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @ib={0x1b, 0x1f, 0x1, {"8e718cafe70ef745fad67f278fbfb94d"}, 0xfffffffffffffff9, 0x5, 0x5}}}, 0x118) getpeername$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='gid_map\x00') ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000040)={0x6, 0xffffffffffffffff, 0x1}) 17:10:59 executing program 2: write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x7ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x4}, @in6={0xa, 0x4e20, 0x7, @mcast2, 0x80}}}, 0x118) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='[\x00', 0xffffffffffffffff) keyctl$assume_authority(0x10, r0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) keyctl$reject(0x13, r0, 0x2, 0x4, 0xffffffffffffffff) r2 = shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) r3 = getegid() r4 = gettid() sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x3}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xfb}, @L2TP_ATTR_MRU={0x6}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x34}, 0x20008040) syz_open_procfs(r4, 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f00000001c0)={{0x2, 0xee01, 0xee01, 0xee01, r3, 0x14, 0x79b2}, 0x6, 0x8, 0x200, 0x0, r4, 0xffffffffffffffff}) 17:10:59 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/58, 0x0, 0x3a, 0xeffffffe}, 0x20) 17:10:59 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0xfffffffffffffec3) 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) r3 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) r4 = request_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='fscrypt:', r3) keyctl$assume_authority(0x10, r4) keyctl$update(0x2, r3, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00022bbd7000fedbdf250700000008001700", @ANYRES32=r2, @ANYBLOB="06001b004e21000006001c000100000008001700", @ANYRES32, @ANYBLOB="080011000000000008000900030000001400080062617461647630000000000005a5964305002200010000000c000f000500000000000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:59 executing program 4: socket(0x1e, 0x3, 0xc) 17:10:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_USER(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x98, 0x3ed, 0x1, 0x70bd25, 0x25dfdbfc, "355cff074aaffa04bb713fc8219b58a2529fdc29ab67f69604321fb24886d66cc02ad325e6f2063e1334732286a41de09c55172ec3b4de347f5bcb5f3a8150e4e99ef7d4abba2fccc11d924e6a8036731f427dfbe2ed291d71e9f3af288c91bbe6b8a28808d36bd1f82bfddf0a87db641f00000000550ed76c2f9d02ab0ee094c18f99e53e", [""]}, 0x98}}, 0x8c1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x6}) ioctl$CHAR_RAW_SECTGET(r0, 0x1267, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:59 executing program 0: r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x180, r0, 0x4, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8}, {0x164, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x180}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$CHAR_RAW_FRASET(r4, 0x1264, &(0x7f0000000340)=0x1000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:59 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000007c0)={0x0, @xdp={0x2c, 0x0, 0x0, 0x37}, @ipx={0x4, 0x97, 0x4f4c, "677f881c113f"}, @ethernet={0x6, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x800, &(0x7f0000000000)='veth1_virt_wifi\x00', 0xe, 0x7fff, 0x7fff}) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r9, 0x107, 0x1, &(0x7f0000000180)={r8, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000340)={0x3cc, r0, 0x20, 0x70bd26, 0x25dfdbff, {}, [{{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1f8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x1f4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x36}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0xfffffd60, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0xec, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r6}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r8}}}]}}]}, 0x3cc}}, 0x40001) 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x484ac1, 0x0) accept4$packet(r1, 0x0, &(0x7f0000000000), 0x180000) ioctl$CHAR_RAW_IOOPT(r1, 0x1279, &(0x7f0000000040)) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 604.713611] device batadv_slave_1 entered promiscuous mode 17:10:59 executing program 4: r0 = socket(0x25, 0xa, 0x3) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x1) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) 17:10:59 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 604.759581] device batadv_slave_1 left promiscuous mode [ 604.790522] device batadv_slave_1 entered promiscuous mode 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) socket(0x10, 0x3, 0x1000) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') [ 604.807127] device batadv_slave_1 left promiscuous mode [ 604.820680] device batadv_slave_1 entered promiscuous mode [ 604.844261] device batadv_slave_1 left promiscuous mode 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:59 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fbdbdf250100000006000e000300000006000200010000000500040002f12a54d676b5bf9d61346356cf00000014fd17cd96df6dc87e000000000000006466c60ade9e4846200000008bdc3cbb285701c44d98137c55a35804f7527ee9a644b2d2e7ec298a9a5532253320611fb22e3d7238f0e5d4fa79d0a1ff53b22ac2f0628eb00973afa3019cf6681b98d3"], 0x48}, 0x1, 0x0, 0x0, 0x4000890}, 0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x3e9, 0x2, 0x70bd2c, 0x25dfdbfd, {0xc, 0x0, 0x1, 0xffffffffffffffff, 0x300000, 0x65, 0x1000, 0x1, 0x0, 0xc981}, ["", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x48041}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x8000, 0x0) read$rfkill(r1, &(0x7f0000000240), 0x8) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:59 executing program 4: socket(0x1d, 0x0, 0x9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000006fbc3899958cda93e959a770e99fcdb0445fa8c4c4e77f93f0c89b5b702a0171d0a17f83702db1402015e8914d4e9b6fe9411f54a35fbdec079d977ff6b5d60900007472284d33c0582df53e14c03a674333e81a422c1044e17b182e22c6cc959ccc4d32e16334ee0ba581ae58636f6cceb566708c6a", @ANYRES16=0x0, @ANYBLOB="10002bbd7000fddbdf250300000005003000010000000500300001000000"], 0x24}, 0x1, 0x0, 0x0, 0x4004004}, 0x1) [ 604.866142] device batadv_slave_1 entered promiscuous mode [ 604.889499] device batadv_slave_1 left promiscuous mode 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) connect$packet(r0, &(0x7f0000000000)={0x11, 0x1a, 0x0, 0x1, 0x1, 0x6, @dev={[], 0x27}}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000100)=0x14) accept$packet(r2, 0x0, &(0x7f0000000040)) 17:10:59 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000000c0)={0x0, &(0x7f0000000040)=""/60, 0x0, 0x3c, 0x1}, 0x20) 17:10:59 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/47, 0xfffffdfd, 0x2f}, 0x20) 17:10:59 executing program 4: socket(0x1d, 0x0, 0x9) r0 = socket$inet(0x2, 0x80000, 0x9a01) getsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:10:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80800) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:10:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r1, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, [], 0x23}}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x19}, 0x8080) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:10:59 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/58, 0x0, 0x3a, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r1, 0x0, 0x0) keyctl$link(0x8, 0x0, r1) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"/401, @ANYRES16=0x0, @ANYBLOB="00022abd7004fddbdf2500000000140002007767310000000000000000000000000014000200776732000000000000000000000000001400020077673200"/74], 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_FLSBUF(r2, 0x1261, &(0x7f00000000c0)=0x3f) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0xa00, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r3}) 17:10:59 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/dlm_plock\x00', 0x200000, 0x0) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f0000001000)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x24002080}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"/1060], 0x424}, 0x1, 0x0, 0x0, 0x40080}, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1f}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3e8, 0x100, 0x70bd25, 0x25dfdbfe, "", ["", "", "", "", ""]}, 0x10}}, 0x40400c0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000001c0)={0x424, 0x3f3, 0x200, 0x70bd2b, 0x25dfdbfb, {0x6, 0x2, 0x39, [0x2, 0x400, 0x1, 0x255f, 0x5017, 0x1, 0x3f, 0x3638, 0x9, 0x2, 0xffffffff, 0x0, 0x401, 0x7, 0x5, 0x5, 0x440e, 0x5, 0xffffffff, 0x0, 0x8000, 0x7ff, 0x101, 0xd67d, 0xffffff57, 0xff, 0x4, 0x8, 0x5, 0x81, 0x2, 0x54, 0x16, 0x6cf6, 0x5, 0x9, 0xfffffff7, 0xca9c, 0x4, 0x6, 0x1000, 0xa4, 0x9, 0x8, 0x80000000, 0x5, 0x65fdfd59, 0xff, 0x0, 0x9, 0x0, 0x3f, 0xa0, 0x7f, 0x7fffffff, 0x9, 0x10000, 0xfffffeff, 0x31, 0x1, 0xfffffeff, 0x3, 0x7fff, 0xbbf], [0x0, 0x34a73821, 0x2, 0x1f, 0x6, 0x5f0, 0x1, 0x8, 0x1, 0x3, 0x5, 0x10000, 0xffff, 0x7ff, 0x8, 0x3, 0x80000001, 0x6, 0x1, 0x9, 0x1, 0x80000000, 0x2, 0x4, 0x5, 0xa5, 0x3ffc00, 0x8, 0xe07, 0xb6, 0xb3, 0x80000001, 0x6, 0x1ff, 0xffff1c31, 0x20, 0xfffffffc, 0xffffffff, 0x918, 0x3, 0xa6c3, 0x18, 0x2, 0x8000, 0x0, 0x3, 0xa4, 0x8, 0xbb, 0xffff8000, 0x4, 0xafde, 0x907, 0x0, 0xd8f, 0x4e8, 0x6, 0x400, 0x3f, 0x9, 0x1, 0x9ab, 0x1000, 0x982a], [0x7, 0x0, 0x3, 0x8, 0x6, 0x3f, 0x2, 0xfffffffb, 0xffffffff, 0x2, 0x80, 0x6, 0xfd14449, 0x6, 0x6, 0x7fffffff, 0x80, 0x46, 0xfffff000, 0x1, 0x9, 0x4, 0x4, 0x8ce4, 0x1, 0x81, 0x3, 0x0, 0xfff, 0x2, 0x1, 0x40, 0x9ac, 0x2, 0x7, 0x1, 0x401, 0xb64, 0x401, 0x7, 0x2, 0x101, 0xb3f8, 0xcc, 0x9, 0xb6, 0xffffffff, 0x1146, 0x200, 0x7, 0xcfd, 0x40, 0x9, 0x4, 0x9, 0x0, 0x1, 0xff, 0x5, 0x0, 0x100, 0x0, 0x4, 0xffffffff], [0x9, 0x1f, 0x1ff, 0x0, 0x0, 0x3, 0x20, 0x9, 0x1, 0x2000, 0x40, 0x0, 0x7, 0x7, 0x80000001, 0x1, 0x7ff, 0x4, 0x8001, 0x1ff, 0x100, 0x8001, 0x7ff, 0xc08, 0x5, 0x638bb598, 0x0, 0x38, 0x4, 0xffff, 0x8, 0x1, 0x3, 0x10001, 0x9, 0x6, 0x6, 0xfffffffc, 0x1, 0x8, 0x4, 0x0, 0x2, 0x400, 0xfffffffc, 0xfffffc01, 0x1, 0x27, 0x2, 0x9, 0xfffffffd, 0x0, 0xbc7, 0x342, 0x4, 0x5, 0xffffffff, 0x76, 0x5, 0xfff, 0x81, 0x81, 0xb747, 0x80000000], 0x1, ['\x00']}, ["", "", "", "", "", "", "", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0x8080}, 0x90) r2 = socket(0x25, 0x800, 0x8) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000018c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="2ccf2fd9c18ee64e96cc46d300f9ff", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf250b00000008002b000800000005002d00010000000500330002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x2404d080}, 0x0) 17:10:59 executing program 5: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x10000) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) 17:10:59 executing program 4: socket(0x2a, 0xa, 0x3) 17:11:00 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) 17:11:00 executing program 2: msgget$private(0x0, 0x84) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "cf258ffaf2d2ca2c9dda99143ef4bc2bbf067b71de9c05a8df29e62f406c11d66da7bea792e1cd135fe21dfdd0aaf672f9e976212a8bf4c4673774cb02a9209d", 0x24}, 0x48, 0xfffffffffffffffa) 17:11:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) shmget(0x1, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000001c0)=0x9, 0x4) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x7c, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@WGDEVICE_A_PEERS={0x68, 0x8, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x1c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 17:11:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/62, 0x0, 0x3e, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x4, 0x70bd2d, 0x25dfdbfc, {0x1, 0x0, 0x0, 0x1}, ["", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x2000c801}, 0x4048054) 17:11:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40804}, 0x20000810) 17:11:00 executing program 4: r0 = socket(0x1d, 0x6, 0xe870) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) keyctl$update(0x2, r1, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket(0x27, 0x4, 0x2) 17:11:00 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f00000000c0)={0x0, &(0x7f0000000140)=""/80, 0x0, 0x50, 0x1}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x80, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x80000001, 0x0, 0x7fff, 0x0, 0xfe, 0x1000, 0xfffffc01}, 0x1c) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f0000000000)=0x4, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000001c0)={0x8, &(0x7f0000000100)=[{0x1, 0xc8, 0xff, 0x5}, {0x6, 0x0, 0x98, 0xffb3}, {0x1f, 0x3, 0x7f, 0x9}, {0x400, 0xd0, 0x81, 0x8}, {0x6, 0xfe, 0x6, 0x6}, {0xe, 0x30, 0x6, 0x1f}, {0x1ff, 0x5, 0x2, 0x1}, {0x40, 0xc7, 0x7, 0x200}]}, 0x10) write$proc_mixer(r0, &(0x7f0000000080)=[{'DIGITAL3', @void}, {'DIGITAL1', @val={' \'', 'Line Capture Switch', '\' '}}], 0x3d) 17:11:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_SECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000080)) accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x80000) 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000080)=0x1, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) write$tcp_mem(r1, &(0x7f0000000000)={0x400, 0x20, 0x800, 0x20, 0x1}, 0x48) 17:11:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) read$rfkill(r0, &(0x7f0000000000), 0x8) 17:11:00 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={0x0, &(0x7f0000000140)=""/42, 0x0, 0x2a, 0x1}, 0x20) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 17:11:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x20000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x33, 0x100, 0xfffffff8, 0x8}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x16, &(0x7f0000000f40)=""/4096, &(0x7f0000000040)=0x1000) 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80000, 0x0) syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x43, 0x40a6c1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000080)=0xffffffff, 0x4) 17:11:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/66, 0x0, 0x42}, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) 17:11:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x282, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) 17:11:00 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="240000002a0004002dbd8300fcdbdf2500080000f7271bd4baeccd5df58a479291ce0cf7605ea00998cb0c8153fd3f87795d36ba2dee70b62e8c0369bec328c784162909c29e458e163b51bddf00c6663449949e74258c7fbcc7e4d3a2e3e72445c656efaa93b272bb609e3775aa93731e15aa5022a27af0ad1c6cee5011f7d9578cd15ab951599ebef58e445e6a70467b844c646c", @ANYRES32=r1, @ANYBLOB="0400e0ff0400f1ff08000700"], 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x8040) 17:11:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r0, 0x1, 0x6, @dev={[], 0x2a}}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6}, 0x10) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x14) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000180)={r7, 0x1, 0x6}, 0x10) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r11 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r11, 0x107, 0x1, &(0x7f0000000180)={r10, 0x1, 0x6}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14, 0x80800) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000940)={&(0x7f00000002c0)=ANY=[@ANYBLOB="6c060000", @ANYRES16=r6, @ANYBLOB="000127bd7000fedbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="7c000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004004000000008000100", @ANYRES32=0x0, @ANYBLOB="7c0002803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="cc01028040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f61646361737400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="88010280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000800000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d00004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r3, @ANYBLOB="400001002400010000d996ce6f72745f737461747300000000000000000000000000000000000000050003000b00000008000400d914000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="e401028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000600000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000700000008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000100000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000101000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000400000008000600", @ANYRES32=r10, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB], 0x66c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000800) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000040)) 17:11:00 executing program 4: r0 = socket(0x1d, 0x0, 0x9) getsockopt$inet_dccp_buf(r0, 0x21, 0xcc, &(0x7f0000000000), &(0x7f0000000040)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10001, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000080), 0x4) 17:11:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) semctl$GETNCNT(0x0, 0x4, 0xe, &(0x7f0000000000)=""/239) r0 = getgid() keyctl$chown(0x4, 0x0, 0xee01, r0) 17:11:00 executing program 1: r0 = gettid() sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x3e9, 0x100, 0x70bd2c, 0x25dfdbfe, {0x97, 0x0, 0x1, r0, 0x2, 0x8dc9, 0xd03, 0x8, 0x0, 0x5}, ["", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) r1 = syz_open_procfs(r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x90, 0x464, 0x100, 0x8, 0x25dfdbfd, "d470b41349cabcb1a73b7f5ec026d08bb4c9460fab2462367d4eb1059807779d286cadc23f51bd356e5c8ebd556d2f6ae51180382342df7d3e3b046b4274538e0be82acdbbde9d4035fa71d5d5d6d5f81883cfbf39c245f482021173c9b79148e1c67bead2c8e39adf945a29f492c3088b48f38baf941a140d4dd0bd2ffd93", ["", "", "", "", "", "", ""]}, 0x90}, 0x1, 0x0, 0x0, 0x48010}, 0x4080) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xf2be}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x4c}}, 0x24048045) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x2, 0xee01, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0x20, 0x3}, 0x0, 0x0, 0x10001, 0x3, 0x9, 0x7, 0x7, 0x3, 0x9, 0xde30, r0, 0xffffffffffffffff}) [ 605.681521] device batadv_slave_1 entered promiscuous mode [ 605.705422] device batadv_slave_1 entered promiscuous mode 17:11:00 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x6}, 0x8) r0 = socket(0x1d, 0x4, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r0}) [ 605.736557] device batadv_slave_1 entered promiscuous mode [ 605.743976] device batadv_slave_1 left promiscuous mode [ 605.751572] device batadv_slave_1 entered promiscuous mode [ 605.758700] device batadv_slave_1 left promiscuous mode [ 605.766880] device batadv_slave_1 left promiscuous mode [ 605.778644] device batadv_slave_1 entered promiscuous mode 17:11:00 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_open_procfs(0x0, &(0x7f0000000180)='timers\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111}}, 0x20) 17:11:00 executing program 2: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbdebb9fedbdf250100000006000a004e2200000500ad9a3a000000000000000000050000000000000000"], 0x38}}, 0x800) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000180)) [ 605.804638] device batadv_slave_1 left promiscuous mode [ 605.811092] device batadv_slave_1 left promiscuous mode 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/49, 0x0, 0x31, 0x1}, 0x20) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nfsfs\x00') setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) 17:11:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="000000009cc69b4adf1bbaed07b88e8f153c43545c9edbff5addcce515b1", @ANYRES16=0x0, @ANYBLOB="10002dbd7000fcdbdf251200000008000b000600000008003a00c200000008002c000000000005002e000100000008000600", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x8040}, 0x40) 17:11:00 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f0000000080)={0x0, "d44bca4548454ec1a20229eb76fb5477e3432a0fbdb214ff145a57cf396370d3e055adcd8016c44e9602436cd80d66c5a4c967ba7758f89b352d7ebec4905267", 0x14}, 0x48, 0x0) r2 = add_key$fscrypt_v1(&(0x7f0000000100)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7", 0x3a}, 0x48, r1) r3 = socket(0x25, 0x1, 0x4800) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000640)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xb8, r4, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}, @WGDEVICE_A_PEERS={0x4}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xfffffff9}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}]}, 0xb8}, 0x1, 0x0, 0x0, 0x8004}, 0x804) keyctl$update(0x2, r2, 0x0, 0x0) r5 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r5, 0x0, 0x0) keyctl$reject(0x13, r1, 0x101, 0x9b83, r5) keyctl$reject(0x13, r0, 0x9, 0x39, r2) socket(0x1d, 0x0, 0x9) 17:11:00 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') r1 = gettid() syz_open_procfs(r1, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000800) sendmsg$AUDIT_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x10, 0x70bd27, 0x25dfdbfd, {0x48, 0x1, 0x0, r1, 0x3, 0x8, 0x5, 0x2}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x4040881) 17:11:00 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r0 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x42, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) write$char_raw(r2, &(0x7f0000001000)={"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"}, 0x4600) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:11:00 executing program 2: openat$sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/tcp_window_scaling\x00', 0x1, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = getgid() keyctl$chown(0x4, 0x0, 0xee01, r1) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getnetconf={0x14, 0x52, 0x800, 0x70bd25, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x24044841}, 0x48001) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:00 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) read$rfkill(r0, &(0x7f0000000000), 0x8) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) 17:11:00 executing program 0: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/oss_mixer\x00', 0x1110c0, 0x0) read$proc_mixer(r0, &(0x7f0000000040)=""/17, 0x11) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/71, 0x0, 0x47}, 0x20) write$proc_mixer(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="4f4741494e0a5245434c45560a50434d20274d6173746572204361707475726520537769746368272030303030303030303030303030303030303030300a4c494e453220274361707475726520566f6c756d6527203030303030303030300a494741494e0ad3f53d8f5d4b509597a07904fc1e19e217175fc331bcc8db40c2b8f2bed01e05a09cf0f330408547262fc89f454555a073e2cd4dfedb6400"/169], 0x70) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x14) 17:11:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0xc802, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1, 0xff, 0x7f, 0x11, 0x20, 0x1, 0x10001}, 0x1c) 17:11:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x400101) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x101, 0x0, 0x401], 0x3, 0x800}) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:00 executing program 4: r0 = socket(0x5, 0x4, 0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, @qipcrtr={0x2a, 0x1, 0x7ffe}, @l2={0x1f, 0x8, @any, 0x100, 0x2}, @l2={0x1f, 0xffff, @any, 0x9, 0x1}, 0xec, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0xffffffff, 0x7ff}) 17:11:00 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/185, 0xb9}}, 0x10) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) 17:11:00 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/52, 0x0, 0x34}, 0x20) 17:11:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x12b202, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x5, @mcast2, 0xffffffff}, @in6={0xa, 0x4e23, 0xfb, @empty}}}, 0x118) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040), 0x0, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x265c, 0x20}) 17:11:01 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp6\x00') ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000040)={0x7fffffff, 0xd9}) 17:11:01 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 17:11:01 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/66, 0x0, 0x42, 0xfffffffc}, 0x20) 17:11:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1e}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r1, 0x1}}, 0x18) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0xffffffff}, 0x20) 17:11:01 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}}, 0x0) socket(0x1d, 0x0, 0x9) 17:11:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080)='wireguard\x00') r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x102, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x2400, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x34, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r0}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x20004080) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000280), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="04002bbd7000fbdbdf250100000014000200776731000000000000000000000000000800010011a916a3e76b2f9a4a26a7e70d645972d91cbd2d1164e29f456ede1565a2ea6f355875effaaca1745aeb3e32c3760c02026f2024de003be84272e8bcb6b7fca694c80d2f098fb09c5eee8cbd2ea86213ea6d89cde46898fdaad86ff980", @ANYBLOB="6df8ae3c8103c9c4", @ANYBLOB="0800070008000000240003000000000000000000e1ffffffffffb43cfb00000000000000000008000500010000000800050000000800"], 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:01 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x5, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x10, 0x40800, 0x4}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x7}}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) r3 = accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000340)={0x0, 0x1, 0x6, @local}, 0x10) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r5 = socket(0x5, 0x6, 0x1ff) sendmsg$nl_route_sched(r5, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@delqdisc={0x34, 0x25, 0x1, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0x8, 0xffff}, {0xffff, 0x1}, {0x6, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x3, 0x32}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xffffffff}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x8051) 17:11:01 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/59, 0xce, 0x3b}, 0xfffffdd6) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, 0x0, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x8}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x5}, 0x40000) 17:11:01 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000040)=0x14) getegid() bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/47, 0x0, 0x2f}, 0x20) 17:11:01 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, &(0x7f0000000080)) accept$packet(r0, 0x0, &(0x7f0000000000)) 17:11:01 executing program 4: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) accept4$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x80800) socket(0x1d, 0x0, 0x9) 17:11:01 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket$packet(0x11, 0x2, 0x300) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000005c0)={r0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="680400002800020029bd7000fedbdf2500000000", @ANYRES32=r1, @ANYBLOB="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"/1104], 0x468}}, 0x20000000) 17:11:01 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0xffffffff}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_IOMIN(r0, 0x1278, &(0x7f0000000000)) 17:11:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={r2, 0x1, 0x6, @random="7fafeccce791"}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:01 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='batadv\x00', 0xfffffffffffffffa) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r1, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0xc001}, 0x4008800) 17:11:01 executing program 4: socket(0x1d, 0x0, 0x9) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8010}, 0x40081) 17:11:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x64, 0x0, 0x93e3b7500127666e, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x100000000}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x7f}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'lo\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x4844) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 606.622531] device batadv_slave_1 entered promiscuous mode [ 606.652130] device batadv_slave_1 left promiscuous mode 17:11:01 executing program 5: r0 = getuid() r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r0, r1) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000180)=""/74, 0x0, 0x4a, 0x200001}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) write$proc_mixer(r2, &(0x7f0000000080)=[{'VIDEO', @void}, {'SPEAKER', @val={' \'', 'Master Capture', '\' '}}, {'VOLUME', @void}], 0x3b) [ 606.678689] device batadv_slave_1 entered promiscuous mode [ 606.709974] device batadv_slave_1 left promiscuous mode 17:11:01 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket(0x2a, 0x1, 0xbec1) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:11:01 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/58, 0x0, 0x3a, 0x2000005}, 0x20) 17:11:01 executing program 4: r0 = socket(0x1d, 0x0, 0x9) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 17:11:01 executing program 2: r0 = socket(0x23, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="44000000ef75914a773e6f0a95385020924e1ad990885083e67fffee948910513c8d16050646c42e251f7f27782efd3558c14645d3534c28226922e9cc13eccad0f2298ab6352ac30e6263b659f69992e42bddd68c2225c39092d26d7619193ce635488ffbe4dd", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fedbdf250800000008000b000300000008000b000200000005000500010000000600010008000000080009000300000006000e0004000000"], 0x44}, 0x1, 0x0, 0x0, 0x20004020}, 0x4004011) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@private0, @in=@private}}, {{@in=@dev}, 0x0, @in=@private}}, &(0x7f0000000200)=0xe8) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b, 0x1}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000240)={r2, 0x1, 0x6, @broadcast}, 0x10) write$proc_mixer(r1, &(0x7f00000001c0), 0x0) 17:11:01 executing program 1: write$tcp_mem(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0x20, 0x400, 0x20, 0x5}, 0x48) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) write$sysctl(0xffffffffffffffff, &(0x7f0000000000)='5\x00', 0x2) 17:11:01 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000ffdbdf250700000006001a004e24000006001c0006000000050005000100000008040a0003000000"], 0x34}, 0x1, 0x0, 0x0, 0x54}, 0x8880) 17:11:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x48000) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:01 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) socket(0x1d, 0x1, 0x9) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xfff}, 0x8) 17:11:01 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x44050) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000240)={0x4, 0xc, 0x80000000, 0x1}, &(0x7f0000000280)=0x109e, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x401}}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sctp\x00') 17:11:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x50, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xff}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}]}, 0x50}}, 0x6f2d205bcbc78aae) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r2, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x3}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x66}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x180}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xffff}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x2004c000}, 0x4000004) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000200)=""/95, &(0x7f0000000280)=0x5f) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000780), 0x4) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x7044}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4880}, 0x4000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x84000, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x6, &(0x7f00000002c0)=[{0x9, 0x5, 0x0, 0x3}, {0x80, 0x3f, 0x9}, {0xffff, 0x20, 0xff, 0x578}, {0x1, 0x5a, 0x9, 0x2}, {0x81, 0xf9, 0xc0, 0xfffffffa}, {0x1f, 0x80, 0x5, 0x7fffffff}]}, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x2c, r3, 0x20, 0x70bd2b, 0x400, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2e}, @FOU_ATTR_AF={0x5, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000001}, 0x24000004) 17:11:01 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="be5a202fbe1c929322508a02f4dfeb01001800000000000000b8000000b8000000050000000c00000000000009010000000500000001000006040000000200000020000000000000000600000d0000b4000b000000020000000c000000050000000100000003000000000000000400000000000000040000000100000004000000070000000a000006040000000400000006000000040000007f00000005000100ed0d00000c00000006cca5c2aa45c5d903e9c2e61c89000000050000000400000003000000ffffffff0c000000ffffff7f0f0000"], &(0x7f0000000180)=""/131, 0xd5, 0x83, 0x1}, 0x20) getegid() r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) getuid() bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$rfkill(r0, &(0x7f0000000000)={0x9, 0x2, 0x33, 0x0, 0x1}, 0x8) 17:11:01 executing program 4: socket(0x1d, 0x0, 0x9) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x20, 0x4, 0x6a5, 0x2, 0x80000001, 0x6], 0x6, 0x180800, 0x0, 0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10081, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x48180, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000000c0)={r2, r1}) 17:11:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000000c0)={0x280, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x264, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}]}, 0x280}, 0x1, 0x0, 0x0, 0x200040c0}, 0x4000010) 17:11:01 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000080)={0x0, &(0x7f0000000040)=""/49, 0x0, 0x39}, 0x20) 17:11:01 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @dev}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)=@bridge_delneigh={0x44, 0x1d, 0x800, 0x70bd29, 0x25dfdbfb, {0x1c, 0x0, 0x0, r1, 0x10, 0x82, 0x1}, [@NDA_LLADDR={0xa, 0x2, @multicast}, @NDA_PORT={0x6, 0x6, 0x4e20}, @NDA_CACHEINFO={0x14, 0x3, {0x8, 0x1000, 0x481, 0x4}}]}, 0x44}, 0x1, 0x0, 0x0, 0x8880}, 0x24004805) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:02 executing program 4: socket(0x1d, 0x0, 0x0) 17:11:02 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 17:11:02 executing program 1: r0 = socket(0x13, 0xa, 0x8f77) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x40080) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/73, 0x0, 0x49}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), 0xffffffffffffffff, 0x2}}, 0x18) 17:11:02 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/46, 0x0, 0x2e}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x38300, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x7f, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x121080, 0x0) ioctl$CHAR_RAW_RAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x3f, 0x8, 0x5, 0x4], 0x4, 0x800, 0x0, 0xffffffffffffffff}) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000240)) 17:11:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x6, 0xb4, 0x81, 0x2, 0x0], 0x5, 0x0, 0x0, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r2, 0x107, 0x16, &(0x7f0000000100)=""/75, &(0x7f0000000180)=0x4b) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x800) socket$nl_generic(0x10, 0x3, 0x10) 17:11:02 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xfffffffffffffff8, 0x1) 17:11:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) getsockopt$inet_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000000000)=""/245, &(0x7f0000000180)=0xf5) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 607.351708] can: request_module (can-proto-0) failed. 17:11:02 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) keyctl$update(0x2, 0x0, &(0x7f0000000000), 0x0) r0 = syz_usbip_server_init(0x1) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/37, &(0x7f0000000040)=0x25) 17:11:02 executing program 3: sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60881000}, 0xc, &(0x7f0000000480)={&(0x7f0000000040)={0x43c, 0x3f3, 0x4, 0x70bd26, 0x25dfdbfc, {0x3, 0x2, 0x18, [0x9, 0x0, 0x5, 0x6, 0xcee1, 0x9, 0x32, 0x1, 0x80000000, 0x4, 0x7f, 0x9, 0x80, 0x200, 0x5, 0x1000, 0x31, 0xd4, 0x9, 0x8, 0xffff8000, 0x0, 0x2f927263, 0x5, 0x0, 0xffffffff, 0x67bc, 0xfffffffe, 0x20, 0x1, 0x3, 0x0, 0xff, 0x8, 0x401, 0x0, 0x1, 0x0, 0xe1, 0x4, 0x81, 0x1, 0xd8, 0x5, 0x0, 0x7, 0x7, 0x1, 0xfffffff8, 0x41a9, 0x4, 0x81, 0x8, 0x8, 0x5, 0x8000, 0x9, 0x200, 0x0, 0x10, 0x8, 0xcec, 0x7, 0x6], [0x50087a24, 0xffffffff, 0x0, 0x9, 0x82, 0x1, 0x1, 0x0, 0x4, 0x6, 0x3, 0x1000, 0x1, 0xcd, 0x4, 0x4, 0x4, 0xbcf, 0xeec, 0xc76, 0xfff, 0x3, 0x2, 0x8, 0x6, 0x81, 0x297d, 0x3, 0x3, 0x9, 0x3, 0x8, 0x4, 0x8, 0xf2, 0x2c2, 0x4, 0x8, 0x10001, 0x80000001, 0x7, 0x2, 0x3, 0x4, 0x800, 0x239, 0x6, 0x4, 0x40000000, 0x4e, 0xff, 0x5, 0x6, 0x8, 0x1, 0x7fff, 0xffffff01, 0x217, 0x0, 0x6, 0x40, 0x4, 0x8, 0x7fff], [0xf539, 0x9, 0x401, 0x9, 0x0, 0x9, 0x101, 0x80, 0x5, 0x6b38, 0x8, 0x1, 0xc95e, 0x5, 0x1, 0x3, 0x0, 0x20, 0x1, 0x3ff, 0x23ae, 0xfffff57b, 0x2, 0x2, 0x800, 0x5, 0x6c0f, 0x8, 0x5, 0x69b, 0x7, 0x2, 0x10001, 0xffff, 0x6, 0x270, 0x6, 0xfffffff8, 0xffffffff, 0xfffffffe, 0x5, 0x1, 0x10001, 0x7, 0x7fffffff, 0x3, 0x7, 0x2, 0xdd9f, 0x7, 0xffffffff, 0x18c, 0x1ff, 0x100, 0x0, 0x7ff, 0x1ff, 0x1, 0x0, 0x4, 0x2, 0xc7, 0x4, 0x5], [0xffffffff, 0x5, 0x3f, 0x8, 0x4, 0xd72, 0x8, 0x8, 0x8001, 0x9, 0x5, 0x8, 0x9, 0x2, 0xfffffff8, 0x7937, 0x8, 0x7, 0x1ff, 0x6, 0x0, 0xffffffff, 0xa69, 0x6, 0x101, 0x0, 0x200, 0x2, 0x1, 0x81, 0x7fff, 0x0, 0xfff, 0x101, 0x10000, 0x7, 0x4, 0x7, 0x200, 0x6, 0x6, 0x650e, 0x0, 0x0, 0x12d, 0x101, 0x200, 0x3, 0x8, 0x7, 0x80000000, 0x5, 0x9, 0x8, 0x9, 0x1, 0x3d, 0x23, 0x9, 0xff, 0x2, 0x8, 0xb80, 0xce], 0x1b, ['(-.\x00', '\'!^\x00', '\x00', '\x00', '*}[-+(%\x00', '*)+!-)&+\x00']}, ["", "", "", "", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x20008841}, 0x43) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) [ 607.393200] can: request_module (can-proto-0) failed. 17:11:02 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="20002dbd7000fcdbdf2512000000050038000100000008002c00ff010000050029000000000005002e000100000005002e000000000005002f000000000008002c000600000008000600", @ANYRES32=0x0, @ANYBLOB="05002e0000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000000) connect$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x18, 0x0, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x7330ff4b0a849c68}}, 0x14) 17:11:02 executing program 4: socket(0x1d, 0x0, 0x9) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000000)) 17:11:02 executing program 5: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bsg\x00', 0x8000, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000002c0)=""/173, &(0x7f0000000380)=0xad) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/nf_conntrack\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200080c2}, 0x8000) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x6}, 0x10) socket(0x1, 0x0, 0x0) r3 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT_ANY(r3, 0xf, &(0x7f00000001c0)=""/87) shmctl$SHM_STAT_ANY(r3, 0xf, &(0x7f00000003c0)=""/178) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/62, 0x0, 0x22}, 0x20) 17:11:02 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0xffffffffffffff36, 0x0}, 0x10) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/187, &(0x7f00000000c0)=0xbb) 17:11:02 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/51, 0x0, 0x33}, 0x20) 17:11:02 executing program 4: accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x40000) [ 607.529635] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 607.535481] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) 17:11:02 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:11:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000200)=0x14) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000180)={r6, 0x1, 0x6}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@private1}}, &(0x7f00000006c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14) r10 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r12 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000180)={r11, 0x1, 0x6}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001080)={&(0x7f0000000780)={0x8dc, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x218, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x3}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0xff, 0x8, 0x1, 0x8}, {0x4, 0x20, 0x1f, 0x2}, {0xff81, 0x0, 0x2, 0xfff}, {0x3ff, 0x4, 0x1, 0x1}, {0x5, 0x8, 0x1f, 0x9}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7987}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4c, 0x4, [{0x1000, 0x7, 0x0, 0x1}, {0x1, 0x9, 0x3f, 0x7b8}, {0x0, 0x5, 0xff, 0x1}, {0x40, 0x1, 0x7, 0x1000}, {0xc6c, 0x5, 0x9, 0x40}, {0xffff, 0x7f, 0x7d, 0x5}, {0x1000, 0x0, 0xff, 0x5}, {0x8, 0x8, 0x7f, 0x81}, {0x401, 0x4, 0x8, 0x1}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x200}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x20}}, {0x8}}}]}}, {{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}]}}, {{0x8, 0x1, r8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x5a78b1c1}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1e}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xd0}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x8dc}}, 0x40) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:02 executing program 1: r0 = getgid() r1 = getgid() r2 = gettid() syz_open_procfs(r2, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000000)={{0x3, 0xffffffffffffffff, r0, 0xee00, r1, 0x80, 0xb5}, 0x0, 0x0, 0x5, 0x40, 0x0, 0xffff, 0x3078, 0x3, 0x5, 0x2, 0xffffffffffffffff, r2}) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:02 executing program 5: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200040, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbff, {0x0, 0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_mr_vif\x00') sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x97e00080}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x3fa, 0x100, 0x70bd28, 0x25dfdbff, {0x1, 0x1}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20008800}, 0xc045) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) [ 607.632225] vhci_hcd: connection closed [ 607.632431] vhci_hcd: stop threads [ 607.645777] vhci_hcd: release socket [ 607.680744] vhci_hcd: disconnect device [ 607.723684] device batadv_slave_1 entered promiscuous mode [ 607.739841] device batadv_slave_1 left promiscuous mode [ 607.765682] device batadv_slave_1 entered promiscuous mode [ 607.783718] device batadv_slave_1 left promiscuous mode 17:11:02 executing program 4: socket(0x1d, 0x0, 0x9) socket$alg(0x26, 0x5, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_STAT_ANY(r0, 0xf, &(0x7f00000001c0)=""/87) r1 = getuid() r2 = getuid() r3 = gettid() syz_open_procfs(r3, 0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x1, r1, 0xee00, r2, 0xffffffffffffffff, 0x10, 0x3}, 0xfff, 0xdc2, 0x401, 0x9, 0x0, r3, 0x8001}) 17:11:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x1a, 0x4, 0x10000) getsockopt$inet_dccp_buf(r1, 0x21, 0x2, &(0x7f0000000000)=""/47, &(0x7f0000000040)=0x2f) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000180)={'team0\x00'}) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000180)={r6, 0x1, 0x6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000540)={&(0x7f0000000a40)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r4, @ANYRESDEC, @ANYRESOCT, @ANYBLOB="4400028040000100240001006c625f74785f686173685f746f5f0000000003000300000008190400"/56, @ANYRES32=0x0, @ANYBLOB="0893b71ddab786634845c02c", @ANYRES32=0x0, @ANYBLOB="400002803c00010024000100757365725f6c696e6b75605f656e61626c6564000000000000000000000000000512c5b955156acbc700040008000600", @ANYRES32=r6, @ANYBLOB="08800100", @ANYRES32=0x0, @ANYBLOB="000102803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r8, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040006000000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040009000000080007000000000008000100", @ANYRES32=r9, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000100000008000100", @ANYRES32=0x0, @ANYBLOB="800002804000010024005f686173685f737461747300000000000000000000000000000000000000050003000b000000080004006bbb000018000700000000003c00010024000100656e61626c6564000000000000000000000000000000000000000000000000000500030006000000040004000800060000000000", @ANYRES32=r10, @ANYBLOB], 0x27c}}, 0x40080) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000600)={0x8, 0xff}) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:02 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000180)={r0, 0x1, 0x6}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r0, 0x1, 0x6, @dev={[], 0x1f}}, 0x10) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:02 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/44, 0x0, 0x2c, 0xfffffffd}, 0x20) 17:11:02 executing program 2: keyctl$restrict_keyring(0x1d, 0xfffffffffffffffe, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)='{\x00') bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x298a83, 0x0) 17:11:03 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x6, 0x0}, 0x8) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x180c00) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f0000000180)=[{0xfc00, 0x81, 0x8, 0x200}, {0x1, 0x0, 0x48, 0xd9}, {0xa1, 0x0, 0x2, 0x80000001}]}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) [ 608.133227] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(3) [ 608.139048] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 608.151572] vhci_hcd: connection closed [ 608.151960] vhci_hcd: stop threads [ 608.161372] vhci_hcd: release socket [ 608.165153] vhci_hcd: disconnect device 17:11:03 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = gettid() syz_open_procfs(r1, 0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/dev_mcast\x00') ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000000)) 17:11:03 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0xfffffffe}, 0x39) [ 608.246672] device batadv_slave_1 entered promiscuous mode [ 608.263054] device batadv_slave_1 left promiscuous mode [ 608.284706] device batadv_slave_1 entered promiscuous mode 17:11:03 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000000c0)={0x0, &(0x7f0000000100)=""/73, 0x0, 0x49, 0x1}, 0x20) 17:11:03 executing program 4: socket(0x1d, 0x0, 0x9) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x1210c0, 0x0) 17:11:03 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x10c, 0x453, 0x400, 0x70bd26, 0x25dfdbfc, "09ed98b801b451c39470a0d17b92cc44606dea257a59985b2ad1e2086677479e2b5d1fb70ec4243e957765015544be1e2857b2f95041dd554afd5ca8009e5b5fee2223fce00810e945b694466d261f66a2c1e9cad0d3bbe4b5dd80cb66b07335aa2facdd487d2f9dd3b3102c27388f065bdfaf278aedbf741647cfc089cf5ca486bfc4605eb459022a2adb69eaaedb13f611a0df36eae15bb1e7cf4301a6ac2bb16d985ceb9d27d5036887440f4b845dfcb41d4a9159945028f9babd63abc8d7d30a71b8d1954db1661e9e0a85dda0547f4ec33369ed808a3c1e31b34799795fbad03f9fce6d2f7cce78694ab645715315661899d8cde9e83a", ["", "", "", ""]}, 0x10c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x20000081) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0xb, &(0x7f0000000000)=0x8b1, 0x4) 17:11:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) getsockopt$packet_buf(r0, 0x107, 0x5, 0x0, 0x0) [ 608.311516] device batadv_slave_1 left promiscuous mode 17:11:03 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x101041, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f0000000000)={0x9, 0x2, 0xc8, &(0x7f0000000340)="53777aa2e4f530a94971794f4a19b51162a5c8fa2cefa0a3591712da4aaa52dd3d1030896398b311b1450052426b779a3297419eb7ef50f790dbd7f7e7cfb4618edea7b60351e1804fb6b33d0590ef3d711b0ec9086367fd29090dab712fca88ac4a069d09ec69748c9888b57b44f2b13b7e870e02c5629881d012b5e1039cb3945e014fd51a533e016a8603e8501f6eaf9077e26f06139b9ab203cca5d8c6a5ec01723ec68ac7916ac1d526f5e1f2836d2b62034d631be3a9e1d27ed2e0ec000000000000000000"}) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f8, 0x100, 0x70bd28, 0x25dfdbfb, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000840}, 0x44801) 17:11:03 executing program 5: keyctl$reject(0x13, 0x0, 0xda, 0x3f, 0xfffffffffffffffc) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f0000000100)=""/59, 0xfffffffffffffcc9, 0x3b}, 0x20) 17:11:03 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1080, 0x0) ioctl$CHAR_RAW_PG(r0, 0x1269, &(0x7f0000000300)={0x9, 0x0, 0xdb, &(0x7f0000000200)="7276f0b8d685a48339532aee459b57c55ad7c3923e7318d8cc5c4da25b16009eba04b85bd835e9173ae19f3733df1093b1d249cf901c6d8f5f1ee9dad6ab95cbcfbdc036cc0465fb9aea5d4490a5a412d97f0e497bc5832e91d134bdb86196c91b561668af0bd549b307808f1c40fd3ab358c1d16b4d6a12d86234a9bb6cabfbaeab2450248741f675757d27e43162954483bea6f1e51b50dce64b1ad17ce2e96003d42e97e538767165a68b5f5f3e1f103186d7e35eec3436f89849c7bf655868b65790120d52fbd78671657ca459d484e6b58398609ad08070ea"}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000ffdbdf250200000006001d0007000000d6000000000000000000000014001f00ff0200000000c9fccaaa9a00000000000000000001"], 0x3c}, 0x1, 0x0, 0x0, 0x8801}, 0x8000) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:03 executing program 0: r0 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x400000) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') ioctl$CHAR_RAW_FRASET(r1, 0x1264, &(0x7f00000000c0)=0x3) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x1, 0x7}) 17:11:03 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_FLSBUF(r0, 0x1261, &(0x7f0000000000)=0x4) socket(0x1d, 0x0, 0x9) 17:11:03 executing program 3: r0 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='#\x00', 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x36, 0x35, 0x0, 0x38, 0x63, 0x64, 0x34, 0x0, 0x61, 0x51, 0x31, 0x65, 0x62, 0x65, 0x31]}, &(0x7f0000000080)={0x0, "c5379955ff8cc17a02111ecc1f3327f70d33b4b9e80d47beaeb88a89e2f8a517f6ea4a41baea2c26727e93d0b5488ca1972fe866e74635e9bdccc8baab97c13f", 0x18}, 0x48, r0) r1 = socket$packet(0x11, 0x2, 0x300) getgid() getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, 0x0) 17:11:03 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/71, 0x0, 0x47}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='numa_maps\x00') write$rfkill(r0, &(0x7f0000000400)={0x3, 0x5, 0x3, 0x1}, 0x8) syz_usbip_server_init(0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000340)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x2}}, 0x18) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x0, 0x8}) 17:11:03 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@newtaction={0xc850, 0x30, 0x1, 0x70bd26, 0x25dfdbfb, {}, [{0x280, 0x1, [@m_ctinfo={0x140, 0xe, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x5}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x6}, @TCA_CTINFO_ACT={0x18, 0x3, {0x9, 0x46e0e410, 0x0, 0x3a4f, 0x9}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x6}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x57}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x80000001}]}, {0xca, 0x6, "df0ab9acb8362136247fe197abd8bf9608df63742a43779ca66c5be57b7714d03b82a8b24628eb19e248aa0a73df737de1e287074ef48ad781911da5c39f551e6894459cb80896c7ab1fbec58eb9a04e369a63b165a49b74431f803697b7ed7872a3c5e4871a0ad1de3ee561a5425f03b6230ea9d7785a0ab250c01dead2f0119d3c241af7a9546a6b1416b891a70cdf1c913ce178d88fd99241c48f4e911fb7abbab536a037bf6b5e8d86ee5fdf0a0c37ec1d4cca54223e5524b8312ca9eac68f999e9f9ca5"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_tunnel_key={0x13c, 0x10, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @remote}]}, {0x103, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x0, 0x9f85252175cc0f4}}}}]}, {0x2eb0, 0x1, [@m_skbedit={0xd8, 0x4, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x1}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x9fb, 0x5, 0x3, 0x1}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x3}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x1}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x8d4}]}, {0x69, 0x6, "3f23a878d6645b0e2a057e7a099cd17e2dbef319a4e5a39a5762554c0493489e590cb5367b9fc4eefe0161e547010f1ecc5fee86e64a551bb410fcbbe32b0a5eb19fc24e6bee8f46d571b4bb445fcc5cc2545b1faef9d5879f5d2e80956408439800ed8045"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_pedit={0x2dd4, 0x17, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x2da8, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe98, 0x2, {{{0xffff, 0xdcf, 0x4, 0x1ff, 0x47d}, 0x4, 0x7, [{0x6, 0xff, 0x7, 0x7, 0x2, 0x7}, {0xe98, 0x3, 0x7ff, 0x58ca812d, 0x5, 0x2}, {0x2, 0x2, 0x7, 0x80000000, 0x2, 0x4}, {0xffffffff, 0x3, 0x6, 0x800, 0x67bf, 0x7}, {0x7, 0x8f, 0x2, 0xda3, 0x2, 0x4}]}, [{0x9, 0x20, 0x5, 0x1, 0x40, 0x100}, {0x3, 0x5, 0xc0, 0x1000, 0x7, 0x40}, {0x8001, 0xe9, 0x6, 0x29, 0x6, 0x2}, {0x2, 0x6, 0x5, 0x20, 0x3, 0x5}, {0x9, 0xcd4, 0x0, 0xac7d, 0x200}, {0xabba, 0x6, 0x3, 0xfffffffa, 0x0, 0x7}, {0x1, 0x7f, 0x8, 0x9, 0x7, 0x7f}, {0x5, 0x7fffffff, 0x401, 0x4d52, 0x8, 0x4}, {0x7, 0x6, 0x4, 0x4, 0x8001, 0x800}, {0x0, 0x9, 0x1, 0x6, 0x0, 0x9}, {0x1, 0x7f, 0x1, 0xffffff01, 0x4, 0x400}, {0x0, 0x39ff0000, 0xaba, 0x10000, 0x7, 0x4}, {0x4, 0xfffffff7, 0x2, 0x9, 0x10001}, {0x4, 0x1000, 0x9c3e, 0x5, 0x100, 0x7}, {0x7, 0x40100, 0x6, 0x33d, 0x200, 0x1000}, {0xfffffff9, 0xa45, 0x4aa, 0x7, 0x40, 0x1}, {0x7, 0x4, 0x9c, 0xffff0148, 0x10001, 0x40}, {0x7fff, 0x9cb9, 0x2, 0x5, 0x4, 0x400}, {0x8001, 0x82, 0x7, 0x3, 0x7, 0x2}, {0x100, 0xcd, 0x6ade, 0x1, 0x4e47, 0x2}, {0x7, 0xfffffe00, 0xfffffff9, 0x6, 0x3, 0x1}, {0x800, 0x80, 0x1, 0x100, 0x101, 0x4}, {0xda0, 0x7fffffff, 0x3, 0x6, 0x80000001}, {0xf, 0x1, 0x3, 0x3, 0x1, 0x8}, {0x8, 0x101, 0x1, 0x2, 0x7fff, 0x6}, {0xfffffffa, 0xff, 0x7fffffff, 0x8000, 0x734, 0x10000}, {0x5, 0x3f, 0xb3, 0x1, 0x6, 0x200}, {0xb1, 0x1ff, 0x941b, 0xfffffffd, 0x5, 0x3}, {0xffff, 0x80000000, 0x2, 0xff, 0xcc0, 0x2}, {0x9, 0x4, 0xfffffffe, 0x800, 0x1, 0x7}, {0x1, 0xc37, 0x800, 0x7, 0xc39, 0x7fffffff}, {0xff, 0x4, 0x2008, 0x3, 0x7, 0x5}, {0x8, 0x4, 0x4, 0x197af160, 0x9, 0x2000}, {0x4035148b, 0x7ff, 0x7, 0xfffffca3, 0x8, 0x929}, {0x8, 0xffffffff, 0x3, 0x0, 0x0, 0x3d}, {0x1, 0x6980, 0x400, 0x7, 0x1ff, 0x7425}, {0x7, 0x8, 0x8, 0x8, 0x8, 0x8}, {0xffffffff, 0x7fffffff, 0x6, 0x8001, 0x8, 0x80000000}, {0xfffffffc, 0xf53, 0x2, 0x6, 0x6, 0x3ff}, {0x8, 0xb8, 0x9, 0x38, 0x1, 0x7}, {0x3f, 0x1ff, 0x8, 0x7, 0x5, 0x1}, {0x3ce, 0x0, 0xfffffffd, 0x4, 0xffffffff, 0x6}, {0x401, 0x1ae8, 0x3, 0x3, 0x100}, {0x1, 0x44f5, 0x10000, 0x8, 0x87e, 0xfffffffb}, {0x7, 0x3, 0x1, 0x8, 0xf4, 0x40}, {0x7, 0xff, 0x180000, 0x3ff, 0x99, 0x8}, {0xfffff000, 0x7, 0xffff, 0x7f, 0x2, 0x9031}, {0x8, 0x0, 0x8, 0x7, 0x2, 0x4}, {0x4, 0x5, 0x81, 0x80000000, 0x2, 0xa9}, {0x0, 0x9, 0xa7ea, 0x5, 0x20, 0x5a4}, {0x7, 0x5, 0xff, 0xca, 0x7ff, 0x1}, {0x8a09, 0x8001, 0x0, 0xffff, 0xae1, 0x5}, {0xca, 0x7, 0x7, 0xd5, 0x1889, 0x10001}, {0x0, 0x7, 0x3ff, 0x9, 0x4, 0xee}, {0x49, 0x5, 0x0, 0x2, 0x743, 0x8}, {0x9, 0x3, 0x6, 0x10000, 0x7}, {0x8, 0x1, 0x9, 0x323, 0x3e}, {0x5, 0x8b1, 0x9, 0x100, 0x865e, 0xcdd}, {0x934, 0x100, 0x9, 0x2, 0x7, 0x6}, {0x100, 0x0, 0x3, 0x8, 0x7, 0x8}, {0x0, 0x8, 0x40, 0x1, 0x1f, 0x80000001}, {0x3ff, 0x7, 0x6, 0x13, 0xfffffffc, 0x8}, {0xffff, 0x4, 0x7, 0x94, 0x7, 0x2}, {0x7, 0x8, 0x28, 0xfffff001, 0x6, 0x2}, {0x2, 0x6, 0x100, 0xfffeffff, 0x1800, 0x7fffffff}, {0x4, 0x1, 0x3, 0x0, 0xc9, 0xbb}, {0x3, 0x0, 0x2, 0x2, 0x5, 0x3ff}, {0x7, 0x2, 0x6, 0x7, 0x46fcea7c, 0x1f}, {0x0, 0x9, 0x1, 0x3, 0x7, 0x1}, {0x49b, 0x6, 0xffffffff, 0xbcc, 0x2, 0x2}, {0x6, 0x1, 0xf1, 0x5, 0x4, 0x8}, {0x7, 0x8001, 0x8bc8, 0xfffffffa, 0x2, 0x739}, {0x4, 0x2000, 0x0, 0x2, 0x7ff, 0xffffffc0}, {0x4, 0x7, 0x0, 0x0, 0x6, 0x3}, {0x6, 0x61ec, 0x7ff, 0x3, 0x5, 0x400}, {0xf263, 0x7, 0x4, 0x1ff, 0x9, 0xdb8e}, {0xff, 0xffffffff, 0x7, 0x1e, 0x4, 0x3}, {0x4, 0x93, 0x9f39, 0xfffffffa, 0x3, 0x80}, {0x3ff, 0xffff, 0x7ff, 0x40, 0x4, 0x401}, {0x10001, 0x8001, 0x5, 0x8, 0x4, 0x6}, {0x0, 0x400, 0xdbc, 0xb8b, 0x7, 0x80000001}, {0xfffffff7, 0x37a, 0x100, 0x1ff, 0x0, 0xffff}, {0x101, 0xff, 0x23, 0x8, 0x8, 0x8}, {0x800, 0x3, 0x9, 0x8, 0x10001, 0xff}, {0x2, 0x1, 0x0, 0xffff, 0x1000, 0x5}, {0x64, 0x0, 0x1, 0xd0, 0x2, 0x5e3}, {0x101, 0x54, 0x5, 0x1, 0x200, 0x4}, {0x0, 0x8, 0x9, 0x5, 0x80000000, 0xc0000000}, {0x4, 0x2, 0x7f, 0xfffffffb, 0xbed, 0x5}, {0x7, 0xfffffeff, 0x8, 0x6, 0xebf, 0x3}, {0x3ff, 0x6, 0x6, 0x3, 0x800, 0x9}, {0x10001, 0xd, 0x34, 0x81, 0x5}, {0xc7, 0x200, 0x5, 0x0, 0x3, 0x2}, {0x81, 0x9, 0x7, 0xfffffff7, 0x6, 0xb1}, {0xfffffffa, 0x38, 0x7ff, 0x7, 0x5, 0xbe}, {0xfff, 0x4, 0x4, 0x925, 0x6, 0x7fffffff}, {0x2, 0x1df91db, 0x7fff, 0x5, 0x100, 0x1000}, {0xffffffff, 0x4000000, 0x8, 0x9, 0xffff, 0xfff}, {0x1, 0xffffffff, 0x966, 0x5, 0x40, 0xffffffff}, {0x4, 0x2, 0x1d8d, 0x604, 0x0, 0x1}, {0xfb88, 0x0, 0xb6f0, 0x8, 0xfffffff9, 0x3}, {0xba3c, 0x2, 0xfffffff8, 0xe0, 0x0, 0xc000000}, {0x200, 0xaca, 0xbd6, 0x5, 0xffff}, {0x6, 0x4, 0x1, 0x3, 0x7, 0x8}, {0x5, 0x7, 0x969, 0x0, 0x7ff, 0x80000001}, {0x9, 0x5, 0x5, 0x8505, 0x3f, 0x5}, {0x8, 0x10000, 0x1, 0x5, 0x9, 0x6}, {0xe4b, 0x6, 0x0, 0x1, 0x7a8b}, {0x4, 0x2, 0x6, 0x7, 0x5, 0x3f}, {0x0, 0x6, 0x2, 0x9d9, 0x9, 0xcbc}, {0x9, 0x800, 0x7, 0x7, 0x3, 0x5}, {0x7, 0x1000, 0x1, 0x38, 0x1f, 0x9}, {0x7f, 0x75e49787, 0x4, 0x81, 0x2, 0x2}, {0x61a7, 0xf1a, 0x8, 0x6, 0x8, 0x3ff}, {0x8, 0x9, 0x2, 0x3, 0x0, 0x2}, {0x1ff, 0x8, 0x4, 0x7, 0x3, 0x10000}, {0x616, 0x9, 0x8001, 0xfffffff8, 0xdb9e, 0x728d}, {0x551b2137, 0x896f, 0xffff, 0x0, 0x9, 0x1}, {0x1, 0x8, 0x5, 0x6, 0x80000000, 0x7ff}, {0x2, 0xffff, 0x9, 0x6, 0x3, 0x20}, {0x10000, 0x8, 0x5, 0x200000, 0x400, 0x7}, {0xae3, 0x0, 0x3, 0x3f, 0x2, 0x9f13}, {0x3, 0x0, 0x2, 0x8, 0x9, 0x6}, {0x9, 0x1, 0x7fff, 0x0, 0x40, 0x5}, {0x9, 0x4, 0x80, 0x37, 0xff, 0xfff}, {0x4, 0x9, 0x400, 0x1, 0xffffffff, 0x7}, {0x0, 0x1, 0x400, 0x7f, 0x5, 0x101}, {0x2, 0x800, 0x1f, 0x2, 0x5, 0x5}], [{0x5, 0x1}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x3}, {0x3, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {}, {0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x2}, {0x2, 0x1}, {0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x5}, {0x5}, {0x3}, {0x4, 0x1}, {}, {0x3}, {0x3}, {0x5, 0x1}, {0x4, 0x1}, {}, {0x4}, {0x4}, {0x5, 0x3}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x4}, {0x3, 0x1}, {0x5, 0x1}, {0x1}, {0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x2}, {0x4}, {0x5, 0x1}, {0x7, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4}, {}, {0x6}, {0x3}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x3}, {0x3}, {0x2}, {}, {0x4, 0x1}, {0x3}, {0x5, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x2}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x6, 0x1}, {0x1, 0x1}, {0x2}, {}, {0x4}, {0x4}, {0x1, 0x1}, {0x756097d003b67363, 0x1}, {0x2}, {}, {0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x4}, {0x2, 0x1}, {}, {}, {0x5}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}], 0x1}}, @TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x1ff, 0x80000000, 0x3, 0x800, 0x9}, 0xdf, 0x81}, [{0xb3e, 0x1, 0x8, 0x10001, 0x3, 0x20}, {0x5, 0x4, 0x40, 0x607f, 0x0, 0xffff}, {0xf0, 0x3, 0x200000, 0x8, 0x7, 0xf1}, {0x2, 0x2, 0x3, 0x4, 0xffff859a}, {0x3f, 0x3, 0x8000, 0x1000, 0x5, 0x6}, {0x3, 0x8000, 0x92d, 0xfff, 0x2, 0x512}, {0x401, 0x1, 0x6, 0x5d, 0x4, 0x4d22de07}, {0x102a00, 0x200000, 0x9, 0x2, 0x5, 0x8001}, {0x2, 0x9, 0x101, 0x4, 0x0, 0x8904}, {0x80, 0x8, 0x1, 0x5, 0x5}, {0x8, 0x1000, 0x455, 0x9, 0x2, 0x1ff}, {0x9, 0x5, 0x5, 0x8, 0xffffff84, 0xba1}, {0x4, 0x81, 0x4, 0x6, 0xb3, 0x2}, {0x9, 0x4, 0x5, 0x1, 0x10000, 0x7}, {0xbfc4, 0x1, 0x9, 0x0, 0x4, 0xfffff19c}, {0x1, 0x5, 0x84, 0xc45, 0x10000, 0x5}, {0x2, 0x9, 0x2, 0x7fffffff, 0xffff, 0xfffffe00}, {0x7fa6, 0x0, 0xe0, 0x7f, 0x7, 0x6}, {0x401, 0x9, 0x9, 0x6, 0x8, 0xf74}, {0x4, 0x3, 0x5, 0x4, 0x9, 0x7fff}, {0x6, 0xd028, 0x6, 0x80000001, 0x1, 0x7ff}, {0x9, 0x545, 0x4, 0x400, 0x10001, 0x37f}, {0x4, 0xc283, 0x8, 0x8, 0x85, 0x2}, {0x4, 0x1, 0x10000, 0x7, 0x2, 0x3f}, {0xa18a, 0x8, 0x2, 0x5, 0x1000, 0x8000000}, {0x2, 0x7, 0x400, 0x2, 0x1f, 0x5}, {0x8, 0x7ff, 0xc0, 0x5, 0xc6f, 0x8}, {0x3, 0x80000001, 0x8, 0x5, 0xa9, 0xff}, {0x81, 0xde9d, 0x9, 0x81, 0x1, 0x5}, {0x89, 0x0, 0x19bd, 0x3ff, 0xf077, 0x81}, {0x4, 0x7ff, 0x0, 0x2, 0x0, 0x8000}, {0x9, 0x6, 0x456, 0x3, 0x10000, 0x5}, {0xa37, 0x7, 0x5, 0x5, 0x2, 0x5}, {0x4, 0x3, 0xff, 0x7fff, 0x40, 0xffffff81}, {0x8, 0x3, 0x5, 0x3c56, 0x3, 0x81}, {0x1, 0x8, 0x1d, 0x4, 0x100, 0x80}, {0x5, 0x400, 0x4c3, 0x3, 0x853, 0x975}, {0x7, 0xfffffa6a, 0x3, 0x7, 0x1, 0x7}, {0x4, 0x7ff, 0x9, 0x800, 0x7, 0x6}, {0x185, 0x0, 0x0, 0xed61, 0x7, 0x80000000}, {0x7, 0x7, 0x54, 0x1, 0x4, 0x80000000}, {0x4, 0x400, 0x20, 0x7f, 0x9c, 0x8}, {0x10000, 0x5, 0xdab, 0xe36, 0x5, 0x3ff}, {0x0, 0x1, 0x0, 0x10000, 0x1000, 0x1000}, {0xe53, 0xfffffff9, 0x8e9, 0x6, 0x2}, {0xfffffffb, 0xffff, 0x3f, 0x0, 0x80000001, 0x5}, {0x4d, 0x1, 0x0, 0x200, 0x9, 0x8}, {0x0, 0xe06, 0x5, 0x8, 0x200, 0x6}, {0x7f, 0x4, 0x9, 0x401, 0xb466, 0x3f}, {0xd7, 0x8000, 0x1, 0x9, 0x0, 0x800}, {0x0, 0x7fffffff, 0x3, 0x6, 0x3, 0x81}, {0x9, 0xfffff046, 0x80000000, 0x3, 0x2, 0x4}, {0x80000001, 0x400000, 0x4, 0x1, 0x6, 0xfff}, {0x0, 0x50, 0xfffffff7, 0x8, 0x6, 0x80000001}, {0xfffffffb, 0x8, 0x3f, 0x100, 0x2, 0x20}, {0x0, 0xffff, 0xfffffff8, 0x20, 0x8, 0x10000}, {0xfff, 0x80000001, 0x5, 0x8, 0x81, 0x7}, {0x1, 0x9169, 0x2, 0x0, 0x3, 0x3}, {0x93, 0x4, 0x401, 0x1, 0xff, 0x9}, {0x5dbb, 0x0, 0x1000, 0x8, 0x10001, 0x8001}, {0x6, 0x0, 0x171, 0x5, 0x8001, 0xb499}, {0x1f, 0x4, 0x80000000, 0x80, 0x2, 0x6}, {0x2, 0x3, 0x100, 0x200, 0xe5a, 0x7}, {0x3, 0x6, 0x80000001, 0x6, 0xb6ac, 0x7fff}, {0x3, 0x5, 0x10001, 0x92f, 0xb9d1, 0x20}, {0x80000001, 0x6, 0x3, 0x80000001, 0xff, 0x7}, {0xd0e6, 0x1, 0x7, 0x865, 0x2, 0xffffffff}, {0x7ff, 0xfc000000, 0x9, 0x246, 0x3, 0xffff}, {0x3, 0x4, 0x8, 0x5, 0x3, 0x864}, {0x7, 0x2, 0x6ffaac4e, 0xd9a, 0x80, 0xfff}, {0x0, 0x7fff, 0xc1b, 0xffffffff, 0xfffff161, 0x2}, {0x80000000, 0x1ff, 0x9, 0x5ff, 0xfffffff9, 0x5c9}, {0x61e, 0x101, 0x6, 0x10001, 0x6, 0x5}, {0x7, 0xfffff42d, 0x6, 0xfffffc00, 0x8, 0x1}, {0x5a6, 0x4, 0x0, 0x3, 0x1, 0xfff}, {0x1, 0x3, 0x8, 0x1, 0x0, 0x1}, {0x836, 0x8af, 0x3, 0x6, 0xa6c, 0x5}, {0xfffffffa, 0x1, 0x9, 0x137c, 0x1ff, 0x7}, {0xff, 0xc5, 0xd2, 0xd000, 0x3, 0x4}, {0x9, 0x9, 0x5, 0x9, 0xffff, 0x2}, {0x8, 0x0, 0x1, 0x100, 0x7ff, 0xffff8000}, {0x80, 0x1, 0x1, 0x4, 0x9, 0xfc}, {0x5, 0x3, 0x6, 0x5, 0x8c65, 0xe61d}, {0x7, 0x5, 0xff, 0x9, 0xffff, 0x400}, {0x7, 0x8f, 0x0, 0x4, 0x912, 0x1}, {0x8, 0xa6, 0x6, 0x8, 0x8001, 0x29}, {0x400, 0x80, 0x10000, 0x3f, 0x2, 0x7fffffff}, {0xffff0001, 0xfffffc00, 0xfffffffc, 0x6446, 0x58c, 0x2}, {0xf4de, 0x8000, 0x80, 0x5, 0x200, 0xffffffff}, {0x4, 0x10000, 0x5, 0x64cbf86e, 0x800, 0x638}, {0xb4, 0x6, 0x6, 0x800, 0x6, 0x3}, {0xffff, 0xfffffffc, 0x20, 0x385e234b, 0x80000001, 0x1}, {0x3ff, 0x2, 0x5, 0x7f, 0x1, 0x4}, {0xbb46, 0x7, 0x5, 0x7fff, 0x3f, 0x7}, {0xfffffffe, 0x3, 0x1, 0x5, 0xfffffffb, 0x8}, {0x80000000, 0x200, 0x80000000, 0x8, 0x3, 0x401}, {0xffffbbbc, 0x8, 0x5, 0x180, 0x100, 0x80000000}, {0x0, 0x8001, 0x4, 0xfffffffd, 0x6, 0x2}, {0x1000, 0x8, 0x7, 0x5, 0x0, 0x2}, {0x80000000, 0x7991, 0x10001, 0x5, 0x3, 0x8}, {0xfff, 0xa8d, 0x6, 0xedb, 0x8, 0xff}, {0x80000000, 0xa0, 0x5, 0xffffffff, 0x5, 0xff}, {0x4, 0x93, 0x1, 0x7fff, 0x7, 0xfffffffe}, {0x8, 0x1000, 0xffff0001, 0x7, 0x1ff, 0x5}, {0x5, 0x7, 0x6, 0x1, 0x2, 0x4}, {0x1000, 0x7bd8cd6a, 0x3, 0x9, 0x3f, 0x2}, {0x1ff, 0x8d2, 0x7ff, 0xffffffff, 0x9, 0x1d20}, {0x81, 0x7fffffff, 0x4, 0x5, 0xfe, 0x1f}, {0x80000001, 0x8, 0x0, 0x101, 0x55, 0x8}, {0xcd, 0x6, 0xffffffff, 0x2d9, 0x0, 0xa6e}, {0x60e, 0x6, 0x8, 0xffff, 0x8, 0x7}, {0xfffffffc, 0x3ff, 0xff, 0x3, 0x3, 0x5}, {0x4, 0x10001, 0x1, 0x80, 0x99f, 0x5}, {0xc, 0x1, 0x4, 0x834, 0x8, 0x1ff}, {0x10001, 0xffffffff, 0xce, 0x80000001, 0x0, 0x5}, {0x200, 0x8, 0x1f, 0x5, 0x200, 0xff}, {0x7, 0x6, 0x9, 0x6, 0x7, 0xb2}, {0x4, 0x6b5, 0x7, 0x5, 0x2, 0x8}, {0x0, 0x6, 0x9, 0x8, 0x5, 0x7}, {0x5, 0x3, 0x7, 0x7fff, 0x2}, {0x2, 0xffff, 0x5dedd74e, 0xffff8000, 0x7, 0x3}, {0x5473, 0x8, 0x7fff80, 0x8, 0x80, 0xfffffffb}, {0x0, 0xffff, 0x1, 0x80, 0x1, 0x1}, {0xce6a, 0x5, 0x5, 0xe4, 0x20, 0x5}, {0x29, 0xffffffff, 0x70b272c0, 0x1f, 0x80, 0x6f}, {0x2, 0x8, 0x3, 0x0, 0x80000001, 0x2bc43804}, {0x7f, 0x80000001, 0xfe7, 0xfffffff8, 0x7, 0x7}, {0x80000000, 0x0, 0x81, 0x8, 0x400, 0x55d6}], [{0x5, 0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {0x0, 0x1}, {0x5}, {}, {0x3, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x4}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x1}, {0x1}, {0x1}, {0x2, 0x1}, {0x2}, {0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x3}, {0x4}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x6}, {}, {0x1, 0x1}, {0x2}, {0x2, 0x1}, {0x1}, {0x1}, {0x3, 0x1}, {0x3}, {0x5}, {0x0, 0x1}, {0x2, 0x1}, {}, {0x4, 0x2}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x3}, {0x4, 0x1}, {0x3, 0x1}, {0x2}, {0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2}, {0x1, 0x1}, {0x5, 0x2}, {0x1, 0x1}, {0x4, 0x1}, {}, {0x3, 0xdd2f6abad6ec2987}, {0x1, 0x1}, {0x2, 0x1}, {0x4}, {}, {0x2, 0x1}, {0x1, 0x1}, {}, {0x6, 0x1}, {0x5}, {0x3}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x0, 0xe09d203ed842bb69}, {0x0, 0x1}, {0x2}, {0x3}, {0x0, 0x1}, {0x7, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x4}, {0x2}, {0x2, 0x1}, {0x4}, {0x1}, {}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x2}]}}, @TCA_PEDIT_KEYS_EX={0x4c, 0x5, 0x0, 0x1, [{0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0xbe330d07afb0ea07}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}, @TCA_PEDIT_PARMS={0xe38, 0x2, {{{0x9, 0xffff, 0x20000000, 0x7, 0x9}, 0x1, 0x2, [{0x9, 0x2, 0x0, 0x7fff, 0x3, 0x2}]}, [{0x6, 0x6, 0x8000, 0x2, 0x6, 0x9}, {0xfbea7e8, 0x7, 0xff, 0x3, 0x49c7, 0x417f}, {0xffffffff, 0x2, 0xfb6, 0x2, 0xd5ff, 0x6}, {0x40, 0x400, 0x8, 0x195, 0x0, 0x5}, {0x7, 0x9, 0x1ff, 0x4, 0x5, 0x1}, {0xc0000000, 0x9, 0x100, 0x2, 0x7fff, 0x1ff}, {0x6, 0x0, 0x3, 0x100, 0x1, 0x9}, {0x101, 0x500000, 0x1f, 0x6, 0x1, 0x4}, {0x1ff, 0x9, 0x81, 0x5b, 0x713f, 0x2}, {0x9, 0x10000, 0x81, 0x5, 0x2b, 0x8}, {0x1ff, 0x7ff, 0xffff, 0x1f, 0x1, 0x20}, {0x7f, 0x200000, 0x7, 0x7, 0x3, 0x8}, {0x4, 0x0, 0x4fe7, 0xd0f, 0xa, 0x7}, {0x3, 0x400, 0xcc, 0x239e3dc2, 0x10000, 0x101}, {0xfff, 0x5, 0x5, 0xffff0001, 0x7, 0x2c1}, {0x20f4, 0x5, 0x6, 0xff, 0xeb5b, 0x40}, {0x8000, 0x0, 0x7f, 0x5, 0x7, 0x6}, {0x5, 0x8, 0x0, 0x2, 0x5, 0x5}, {0x6, 0x1000, 0xe6a, 0x6, 0xd8, 0x2}, {0x9, 0x4, 0xf10d, 0x6e5b, 0x1, 0x10000}, {0x0, 0x0, 0x8000, 0x1000, 0x99ae, 0xfffffffe}, {0x6, 0x1fffc000, 0x3, 0x8, 0x5, 0xc6e9}, {0x0, 0x80000001, 0x10000, 0x5, 0x9}, {0x20, 0x60, 0x3ed, 0x2, 0x9, 0x4}, {0x6, 0x7, 0x613f, 0x8001, 0x71c, 0xffffffff}, {0x4, 0x5, 0xc3d, 0x0, 0xffffffe0, 0x80}, {0x3, 0x4, 0x5, 0x7fffffff}, {0x9, 0x3, 0x8000, 0x400, 0x8, 0xffffffff}, {0x0, 0x80000001, 0xfffffffb, 0x8000, 0x0, 0x1}, {0x3, 0x7, 0x8001, 0x20, 0x24, 0x1000}, {0x4, 0x4bc, 0x5, 0xff, 0x8000, 0x20}, {0x5aa2, 0x6, 0x9, 0x5, 0x9, 0xffffffff}, {0x9, 0x7fff, 0x5, 0x9, 0x6, 0x7ff}, {0x6, 0x3, 0x5, 0x98d, 0x9, 0x100}, {0x3ff, 0x71, 0x99, 0x1000, 0x635, 0x59a1}, {0x6, 0xad3, 0x6, 0x43d, 0x4, 0x6}, {0x9, 0x4, 0x4c8c, 0x79, 0x7fffffff, 0x100}, {0xfffffd91, 0xbdd, 0xff, 0x9, 0x80, 0x5}, {0x881, 0x6, 0x8, 0x9, 0x8, 0x80000001}, {0x81, 0x200, 0x7, 0x0, 0x3ff}, {0x7, 0x3b1031e2, 0xfffffffb, 0x4, 0x6, 0x101}, {0x3ff, 0x6, 0x81, 0x0, 0x10000, 0x3ff}, {0xffffffff, 0x4, 0x1, 0x6, 0x2, 0x6}, {0x71, 0x7, 0xfffff6b2, 0x1ff, 0x0, 0x80000000}, {0x7ff, 0x4, 0x900, 0x2, 0xffffffff}, {0x401, 0x95, 0xfffffc01, 0x69, 0x2, 0x623c}, {0xc54, 0x7f, 0x8001, 0x3, 0x8, 0x1}, {0x10000, 0x80, 0x1, 0x1, 0x4, 0x7}, {0x3, 0x9, 0x6, 0x4, 0x7f, 0x4}, {0x2, 0x6, 0x8, 0x85a8, 0x5, 0xfff}, {0x80, 0x89, 0x7, 0x3f, 0x2, 0x4}, {0x9, 0x1, 0x5, 0xffffffff, 0x3ff, 0xffff}, {0xd7, 0x3ff, 0x8001, 0x400, 0xffffffa8, 0x2}, {0x2, 0x7f, 0x8, 0x77, 0xfffffc00, 0xc51e}, {0x7, 0x2, 0x7fffffff, 0x0, 0x60, 0x20}, {0x81, 0x9, 0x800, 0x41, 0x1ff, 0x6}, {0xfffffff9, 0x1000, 0x8, 0x1, 0x8, 0xfffffff9}, {0x100, 0x6, 0x9, 0xffff, 0x8000, 0x1}, {0x4df, 0x3f, 0x6, 0x100, 0x4040000, 0x6}, {0x200, 0x80000001, 0x4, 0x8b4, 0x6, 0x7f}, {0xc00, 0x3, 0xff, 0xfffffffe, 0xfffff801, 0x9}, {0xc7, 0x0, 0x3, 0x7, 0x4}, {0x80000000, 0x1, 0x9, 0x7, 0x400, 0xff}, {0xb5b, 0x2, 0x4, 0x396b, 0x8, 0x8}, {0x8, 0x0, 0xeb, 0xfffffff8, 0x3314, 0x9}, {0x401, 0x0, 0x95, 0x52fcaace, 0x1000, 0x7}, {0x3ff, 0x5, 0x0, 0x8, 0xfffffffa, 0x7b}, {0xda0c, 0x6, 0x1, 0x3, 0x3ff, 0x1da}, {0x401, 0x7ff, 0x2, 0x80000000, 0x8, 0x1}, {0x8, 0x4dd, 0x0, 0x400, 0x7f, 0x9}, {0xfffffffa, 0x6, 0x1, 0xaada, 0x9, 0x2}, {0xfc000, 0x9, 0x0, 0x4, 0x78e, 0x2}, {0x3, 0x2, 0x3, 0xffffffff, 0x800, 0x2}, {0x4, 0x4, 0x3, 0x4, 0xdcb, 0x2}, {0x9, 0x4, 0x8, 0xcce8, 0xfffffff7, 0x8001}, {0xf67, 0x2, 0x0, 0x401, 0x1, 0x30}, {0x6, 0x6d, 0xfffffffd, 0x1ff, 0x4, 0x10000}, {0x8, 0x4, 0x250bc20e, 0x3, 0x1, 0x8}, {0x3fb, 0x7ff, 0x4, 0xba, 0x4, 0x7}, {0x5, 0xfffffc00, 0x6, 0x0, 0x3, 0x7}, {0x9, 0xb6a, 0x80000001, 0x5, 0x9, 0x6}, {0x80000001, 0x400, 0x1, 0x4, 0x1, 0x9}, {0x7fffffff, 0x6, 0x1, 0x2, 0x9, 0x5}, {0x72, 0x5, 0x0, 0x3, 0x6, 0x51e7}, {0x1ff, 0x8, 0x5, 0x1, 0x8000, 0x80}, {0x391ae7fd, 0x8, 0x40, 0x8001, 0x8, 0x3}, {0xffffff80, 0x3ff, 0x6, 0x9, 0x1, 0x3}, {0x4, 0x8, 0x4, 0x7fffffff, 0x7, 0x6769}, {0x4, 0x6, 0x0, 0x2, 0x6, 0x4}, {0x80000000, 0x10001, 0x6, 0x9, 0x8, 0xffffffff}, {0x0, 0x8, 0x0, 0x8001, 0x0, 0xfdb}, {0x8, 0x1000, 0x40, 0xde3a, 0xfffffe00, 0x1000}, {0x7, 0x5, 0xffff0000, 0x6, 0x3, 0x1000}, {0x3f, 0x7, 0x6, 0x7fff, 0x8, 0x800}, {0x4, 0x5, 0x2, 0x8, 0x101, 0x80}, {0x3, 0x8, 0x81, 0xa87, 0x677, 0x4}, {0x97, 0xae, 0x8000, 0x6, 0x2, 0x10000}, {0x5, 0x6, 0x8, 0x3f, 0x5, 0xfffffbcf}, {0x400, 0x6, 0x5, 0x1f, 0x200, 0x1}, {0x100, 0xff, 0x9e, 0x3, 0x3f, 0x4cc3}, {0xee0, 0x1ff, 0x3, 0x44e2, 0x3, 0xffff8c6c}, {0x40, 0x0, 0x4, 0x40, 0x10000, 0xffffffff}, {0x1914, 0x60a2, 0x5d, 0xd757, 0x20, 0x3}, {0x0, 0x401, 0x1ff, 0x8, 0x3ff, 0x1}, {0x7, 0x40, 0x6, 0x7f, 0x2}, {0x2, 0x80000001, 0x9, 0xffffffff, 0x1, 0x1}, {0x0, 0x40, 0x3, 0xffffffff, 0xfffffeff, 0x7f}, {0x8, 0x1, 0x3, 0x4eac, 0x200, 0x7}, {0x101, 0x4, 0x5, 0x53d, 0x9e5, 0x1ff}, {0x7, 0x6b3, 0x80, 0x9, 0x1f}, {0x1f, 0x81, 0xffff1942, 0x1, 0xfb, 0x2}, {0xfffffc00, 0x1, 0x0, 0x7, 0x616f195e}, {0x800, 0xfffffffa, 0x0, 0x10000, 0x1, 0x9}, {0xe5e, 0x2120, 0xc0000000, 0x1, 0x9, 0x10000}, {0x80000000, 0x6c, 0x5, 0x200, 0x9, 0x1}, {0x3, 0x1ff, 0x7, 0x6, 0x9, 0x1}, {0x5, 0x3, 0x5, 0x4, 0x2e, 0x2}, {0x706, 0x0, 0x0, 0x3527, 0x1, 0xffffffff}, {0x9, 0xffffffe0, 0x200, 0x5a, 0x6, 0xffffffff}, {0x5, 0x0, 0x7, 0x0, 0x3, 0x9}, {0x4, 0x401, 0x2, 0x9, 0x8, 0x4}, {0x1, 0x4, 0xf6, 0x8, 0xd49, 0x40}, {0x0, 0x9, 0x1ff, 0x3, 0x3d, 0x32d2}, {0x8, 0xc189, 0x2, 0x3, 0x4f5, 0xfffffff9}, {0x7fffffff, 0x2693, 0x8, 0x6, 0xfc16, 0xfffffffc}, {0x9, 0x5, 0x377, 0x8, 0x200, 0x3}, {0xcc25, 0x3f, 0x63e, 0x1, 0x3, 0x1000}, {0x6, 0x0, 0x5, 0x1, 0xfff, 0xffff}], [{0x4}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0xf, 0x1}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x2, 0x1}, {0x6}, {0x6}, {0x3, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0xc8ebeb135993e016}, {0x4}, {}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {}, {0x4, 0x1}, {0x9, 0x5322312c08025421}, {0x1}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x3}, {0x1}, {0x5, 0x1}, {0x3}, {0x2}, {0x4}, {0x4, 0x1}, {}, {0x3, 0x1}, {0x2}, {0x5}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x2}, {0x5}, {0x989334497b2fa563, 0x1}, {0x5}, {0x4, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x3}, {}, {0x5, 0x1}, {0x1}, {0x2, 0x1}, {0x5}, {}, {0x1}, {0x1}, {0x2}, {0x3}, {0x2, 0x1}, {}, {}, {0x7}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x3}, {0x4, 0x1}, {}, {0x2}, {0x2, 0x1}, {0x4}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x5}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x2, 0x1}, {}, {0x1, 0x1}, {}, {0x1, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x1a8, 0x5, 0x0, 0x1, [{0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x7}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0xc0, 0x5, 0x0, 0x1, [{0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x4}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x4154, 0x1, [@m_ctinfo={0xac, 0x0, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x1}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x6}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x5}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x834}]}, {0x5e, 0x6, "3954dd8daa2e29f33a3cb0108a17c7f1306d7ed3964e191fb95394a3587d269e73b2c975d73ae62f65d02a9e3813e1910d0135cb3eac2d2cb6b9565270f5172a5880374bd8568004c66f11cf4c031501da20b45c3d015d90ff1c"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3}}}}, @m_pedit={0x1dc0, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1d1c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xeb0, 0x2, {{{0x1, 0x3, 0x6bccbacf702e8806, 0x4, 0x80000000}, 0x1, 0x2, [{0x8, 0x8, 0x0, 0x6, 0x9, 0x99}, {0xffffe7cc, 0xffff5837, 0x9, 0xdf2, 0x1, 0x8000}, {0x1, 0x68, 0x3, 0xf752, 0x40, 0x7}, {0x20, 0x8001, 0x3, 0x80000001, 0x1, 0x6}, {0x40, 0x1, 0x7, 0x5571, 0xc65d, 0x16a}, {0x6b, 0x7fffffff, 0x3, 0x3, 0x6, 0xb4c6}]}, [{0x80000001, 0x61, 0x800, 0x1ff, 0x7, 0x7fffffff}, {0xfffffffa, 0x2, 0x6, 0xd8b7, 0x2, 0x7}, {0x18c, 0x4, 0x5, 0x1, 0xffffffff, 0xb28}, {0x5, 0x9, 0x2, 0xfffffff8, 0x4, 0x2}, {0x3, 0xc81a, 0x1f, 0x1, 0x2, 0x7}, {0x6, 0x8001, 0x400, 0x3f, 0x2, 0x4000000}, {0x1000, 0x2, 0x8, 0x8, 0x3, 0xcd5}, {0x80000001, 0x8, 0x3ff, 0x1, 0xfff, 0xcb2}, {0xfff, 0x7fff, 0x8, 0x8, 0xffff0001, 0x6}, {0x8, 0x7f, 0x2, 0x8, 0x7, 0x7fffffff}, {0x2, 0x7, 0x16c6, 0x6, 0x4eb, 0x2}, {0x8, 0x7, 0x0, 0x4, 0x0, 0x1}, {0xbfb1, 0x7, 0x5, 0x6, 0x5, 0x4}, {0xe401729, 0x692, 0x6, 0x0, 0x4, 0xc000000}, {0x6b7, 0x0, 0x1ff, 0x8, 0x5, 0xaf}, {0x7fff, 0xffffffff, 0x1, 0x3ff, 0x3, 0x7f}, {0x548, 0x3d, 0x1ff, 0x8000, 0xfffffdee, 0x9}, {0x101, 0xba, 0x2, 0x4, 0x9, 0x10001}, {0x1, 0x7, 0x9, 0x81, 0x3, 0x8}, {0x400, 0x79, 0x8, 0xef, 0x0, 0x5}, {0x5, 0x7, 0x8001, 0x10001, 0x0, 0x5}, {0x3, 0x1ff, 0xfffff001, 0x9590, 0x8000, 0x4d5b}, {0x80, 0x40000, 0x5, 0x6, 0x8, 0x7}, {0xfffffffa, 0x4, 0x3840, 0x4, 0x7, 0x80000001}, {0xffffff3a, 0x7ff, 0x40, 0x9, 0x3}, {0xccb6, 0xffffffff, 0xdc, 0xa3, 0x2, 0x4e9}, {0x1, 0x20, 0x5, 0x6, 0x8}, {0x0, 0x1000, 0x80000000, 0x774, 0x40, 0x5}, {0x1, 0x6, 0x2, 0x3, 0x3, 0x4}, {0x5, 0xffffffff, 0x7, 0x8, 0x10001, 0x6}, {0x7fffffff, 0x4, 0x1, 0x9, 0x8, 0x10001}, {0x4, 0x6, 0x8, 0x1, 0x10000, 0xffff}, {0xffff8001, 0x498bf5a9, 0x4, 0x1, 0x200, 0x4}, {0x5, 0x1ee, 0x200, 0x6, 0x1ff, 0xfff}, {0x8001, 0x7f1, 0x6, 0x200, 0x7, 0x8}, {0x472e, 0x0, 0x91, 0x6, 0x8000, 0xef18}, {0x7, 0x1000, 0x3, 0x0, 0x800, 0x4}, {0x0, 0xffffff16, 0x1, 0x9, 0x1000, 0x5}, {0x6, 0x6, 0x1, 0x68, 0x3, 0x2}, {0xf7f, 0x9, 0x4, 0x3, 0x0, 0xfffffffa}, {0x8, 0x62, 0x1f, 0x5d2, 0xfffffff7, 0xffff4c36}, {0x9, 0x7, 0x81, 0x800, 0x5, 0xb38}, {0x2, 0x1, 0x8, 0xfeb, 0xffff, 0x1}, {0x3, 0x40, 0x4, 0x10000, 0x5, 0x6fc}, {0x9, 0x6, 0x7, 0x6, 0x0, 0xffffffff}, {0x7363, 0x6, 0x200, 0xfffffff8, 0x400, 0x1}, {0x32e4, 0x800, 0x7, 0x9, 0x0, 0x3}, {0x8, 0x1, 0x21, 0xfff, 0x7, 0x2}, {0x4, 0x4, 0x400, 0x2, 0x7, 0x1f}, {0xa36, 0x9cc7, 0x4, 0x9, 0x0, 0x800}, {0x1, 0x1, 0x0, 0x1000, 0x68000000, 0x800}, {0x0, 0x4, 0x80, 0x3ff, 0x0, 0x4}, {0x3, 0x0, 0x6, 0x10001, 0x7, 0x7}, {0x6, 0xfffffffc, 0x8, 0xffffffff, 0xb9e1, 0x6}, {0x800, 0xff, 0xaf20, 0x3, 0x3, 0x3f}, {0x1000, 0x6, 0x517, 0x7, 0xb3d, 0x9}, {0x6, 0x10001, 0x6, 0x8, 0x5, 0xe83f}, {0x4, 0x3, 0xbb, 0xffffffff, 0x40, 0x6}, {0xffff7d4f, 0x200, 0x3, 0x3, 0x40, 0x40000000}, {0x0, 0xffff, 0x8001, 0x9, 0x4, 0xffffffff}, {0x1, 0x1, 0x81, 0x1, 0xfffffc01, 0x3}, {0x80000001, 0x0, 0x0, 0x7000000, 0xf6f7}, {0x3ff, 0x3, 0x3, 0x6, 0x7ff, 0x4}, {0x5, 0x8001, 0x2, 0x80, 0x7, 0x80000001}, {0x9, 0x7ff, 0x3ff, 0x4, 0x800, 0x97e7}, {0x8001, 0x9, 0x24b5, 0x571a, 0x4, 0x8}, {0x8, 0xd60, 0x3, 0x1, 0x8, 0x6}, {0x10001, 0x6, 0x9, 0x1f, 0x2, 0xffffff81}, {0x9, 0x3, 0x7, 0x7fffffff, 0x800, 0xffff}, {0x7, 0x401, 0x81, 0x4, 0x3f, 0x25}, {0x0, 0x8, 0x4, 0xdfd765c5, 0x1, 0x3}, {0x4, 0x2, 0x31c, 0x7, 0x2, 0x7}, {0x0, 0x6, 0xffff, 0x9, 0xffff61ff, 0xfffffffc}, {0x4, 0xac25, 0x5, 0x0, 0xf1f, 0xffffff3e}, {0x6efcbc8e, 0x9, 0x9, 0xffffffff, 0x0, 0xffff}, {0x7fffffff, 0x0, 0x9342, 0xfffffffb, 0x38000000, 0x1}, {0x80, 0xfa6, 0x7, 0x5, 0x6, 0x2}, {0xeb23, 0xfffffffc, 0x9, 0x3, 0x9, 0x5}, {0x10001, 0x6, 0x1f, 0xfffffff7, 0x3ff, 0x800}, {0x6, 0xffffffff, 0x8001, 0xffffffc0, 0xef8, 0x3}, {0x800, 0x0, 0x1ff, 0x4, 0x4, 0x84}, {0x2, 0x384000, 0x200, 0x3, 0x1, 0x1}, {0x0, 0xf573, 0x80000000, 0x7ff, 0x401, 0x7f}, {0x401, 0x9, 0x5, 0x7, 0x9, 0x4}, {0x800, 0x3, 0xfffffc01, 0x2, 0x2, 0xe1}, {0xffffffff, 0x61f, 0x0, 0xd90, 0x5, 0x3ff}, {0xb4, 0xee, 0x8, 0x5, 0x2, 0x8001}, {0xff, 0x7, 0x3, 0x0, 0x1, 0x3e}, {0xa8, 0x0, 0xc3, 0x1, 0x4, 0x1000}, {0x3, 0xffffffc1, 0x8001, 0x0, 0x8e, 0x8000}, {0x9, 0x0, 0x3, 0xf199, 0x1f, 0x400}, {0x0, 0x0, 0x3, 0x8, 0x4, 0x4}, {0x6, 0x6, 0x2, 0x3, 0x1, 0xfffffffd}, {0x1637, 0x200, 0x1000, 0x8, 0x1000, 0x9}, {0x9, 0x0, 0x0, 0x7fffffff, 0x564, 0x3}, {0x8, 0x80000001, 0x976b, 0x20, 0x8, 0x7}, {0x7f, 0x0, 0x8, 0x5, 0x8, 0x3f}, {0x7fffffff, 0x0, 0x85, 0x7, 0x7, 0x2}, {0x4, 0xa9400000, 0x1, 0x0, 0x5f954bcc, 0x5243}, {0x3, 0xc7d5, 0x1, 0x6, 0x3, 0x1ff}, {0x5, 0x3, 0x1, 0x6, 0x8d, 0x7ff}, {0x8, 0xbc99, 0x2, 0x7f, 0x2, 0x800}, {0x3, 0x101, 0xffffffed, 0x1, 0x3, 0x1}, {0x2, 0x3, 0xa4, 0x200, 0x3, 0x8}, {0x1f, 0x9, 0xff, 0x8, 0x12, 0x676}, {0x3f, 0x6b3, 0x80, 0x0, 0x2, 0x6}, {0x11, 0x20, 0x1, 0x4, 0x2, 0x1}, {0x3f, 0x9, 0x8, 0x6, 0x1ff, 0x400}, {0x255, 0x1, 0x7fffffff, 0x1, 0xffffffff, 0x10001}, {0x81, 0x6f17, 0x8000, 0x8, 0x6, 0x1f}, {0x6, 0x0, 0x401, 0x8, 0xbc8, 0x7ff}, {0x400, 0x130, 0x7ff, 0x3, 0x4040, 0x1}, {0x2, 0x0, 0x8, 0x3, 0x3ff, 0x7}, {0x1, 0xf21, 0x40, 0x6, 0xffffffff, 0x7}, {0xffffffff, 0x7, 0x3f, 0x2, 0x2}, {0x8001, 0x1, 0x5f6, 0x7, 0x83, 0x7fff}, {0x8, 0x8, 0xffff6071, 0xffffffff, 0x9, 0x12f2}, {0x0, 0x5, 0xff, 0x3, 0x400}, {0x8, 0x8, 0x5, 0xb3a, 0xffff, 0x7}, {0x7f, 0x101, 0x0, 0x2, 0x0, 0x3}, {0x2, 0x8, 0x401, 0x0, 0x9, 0x3b83}, {0x6, 0x40, 0x800, 0x5c7f1d3f, 0xfffffff8}, {0x160a, 0xffff, 0x40, 0x400, 0x10000, 0x4}, {0xa8b5, 0x8, 0xb6, 0x700, 0x100, 0x500000}, {0x6, 0x40, 0xfffffff8, 0x7ff, 0x5, 0x7}, {0x101, 0x10001, 0x80000001, 0x93, 0x10000, 0xeb6a}, {0x8, 0x81, 0x80000000, 0x3, 0x80000001, 0x10000}, {0x1000, 0x10001, 0x1, 0x8, 0x3e, 0xf4a3}], [{}, {0x1, 0x1}, {0x3}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x6, 0x1}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x5}, {0x5, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x3, 0x1}, {0x5}, {}, {0x3}, {0x1, 0x1}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {0x2}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {}, {0x2}, {0x5}, {0x4, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {}, {0x4}, {}, {0x2}, {0x2, 0x1}, {0x2}, {0x3}, {0x3, 0x1}, {0x8f222ad17d3d26f9}, {0x4}, {}, {0x4}, {0x4, 0x1}, {0x2}, {0x6}, {0x1, 0x1}, {0x4}, {0x5}, {0x7}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0xdc5b558fbc691e4}, {0x4}, {0x4, 0x1}, {}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x7, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x3}, {0x5}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x3}, {0x2, 0x1}, {0x3}, {0x5, 0x1}, {0x5}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x69941373dac55aa3, 0x1}, {0x2}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x4}, {0x2}, {0x1, 0x1}, {0x4}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x9, 0x0, 0xffffffffffffffff, 0x8}, 0x4, 0x2, [{0x101, 0x8d, 0x7fffffff, 0x8, 0x1f, 0x9}, {0x6, 0xfffffff7, 0x0, 0xffffff31, 0x7, 0x4}, {0xfff, 0x2, 0x1, 0x80000001, 0x4, 0x8001}]}, [{0x7fffffff, 0x8, 0x8f, 0x401, 0x8000, 0x1}, {0x7, 0x5a, 0x1, 0x9, 0x80, 0x1ff}, {0xffffff01, 0x5, 0x400, 0x1, 0x5, 0x8}, {0x80000001, 0x9, 0x7, 0x0, 0x101, 0x9efb}, {0x3, 0x40, 0x5, 0x0, 0x80000001, 0x401}, {0x9, 0xb7a, 0x8, 0x4, 0x3, 0x6}, {0x23a7, 0xffffffff, 0x7, 0x7fffffff, 0x1, 0xec8}, {0x7fffffff, 0xffffffff, 0xfffff916, 0x5, 0x1, 0x3}, {0x7, 0x4, 0x2, 0x7, 0x0, 0x2}, {0x1, 0x0, 0x3, 0x4, 0x0, 0x401}, {0x9, 0x81, 0x0, 0xc8, 0x7fffffff, 0x1ff}, {0x1800000, 0x1, 0x7fffffff, 0x8, 0x8, 0x8}, {0xb01c, 0x10000, 0x766, 0x3, 0x0, 0x101}, {0x4, 0x10000, 0x20, 0x6dd7, 0x5, 0x1}, {0x5, 0x1, 0x2, 0x3, 0x7fff, 0x7}, {0x200, 0xfff, 0x8e, 0x100, 0x80000000, 0x5}, {0x40, 0xffffffff, 0x0, 0x616, 0x6d, 0x7}, {0x2, 0x0, 0x8001, 0x10001}, {0x401, 0x8, 0x5, 0x6, 0x3, 0x4}, {0x2, 0x7, 0x2, 0xaf0, 0xa, 0x8}, {0xe1, 0x3, 0x4, 0x0, 0x9, 0x101}, {0x200, 0xd6, 0x9, 0x81, 0xfffffff7, 0x3}, {0x2, 0x7fffffff, 0x9, 0x7}, {0x9, 0x4, 0x0, 0x8000, 0x9, 0x3f}, {0x6, 0x8, 0x9, 0x1ada, 0xffffffe1, 0x3}, {0x8000, 0x5, 0x80000000, 0x1, 0x1, 0x6}, {0x2, 0xbc94, 0x1, 0x1, 0x8, 0x7fffffff}, {0x2, 0x1000, 0x7fffffff, 0x80000000, 0x6, 0x4}, {0x5, 0x0, 0x401, 0x20, 0x8000, 0xfffffffe}, {0xfffffa16, 0x5, 0x4, 0xf3, 0x2, 0x9}, {0x30000000, 0xfff, 0x9, 0x806c, 0x1, 0x77b1ef84}, {0xfffffffa, 0x7f, 0x20, 0x0, 0x6, 0x4a}, {0x2, 0x8, 0x5, 0x193c, 0x5, 0xbd}, {0x1, 0x6, 0x3ff, 0x7, 0xfff, 0x2}, {0x6, 0x0, 0x80, 0x7f, 0x4, 0xc9f}, {0x1, 0x4, 0x3, 0x1, 0x5ce, 0x6}, {0x10001, 0x4, 0x0, 0x4, 0xc13, 0x4d}, {0x0, 0x80, 0x8, 0x8, 0x3, 0x3}, {0xff, 0x0, 0x200, 0x3ff, 0x9, 0x18c}, {0x43a, 0x9, 0x6, 0x0, 0x9, 0x1}, {0x6, 0x3f, 0x7f, 0x5, 0x4, 0x8f}, {0x40, 0x0, 0x8001, 0x1000, 0x5, 0x6}, {0x4, 0x7, 0x1, 0x8, 0x8001, 0x9}, {0x2, 0x1, 0xec, 0x80000001, 0x8, 0x133}, {0x6, 0x80000001, 0x3, 0x1, 0x7, 0x8}, {0x9, 0x2b, 0xcdeb, 0x1, 0x8800, 0x4}, {0x790, 0x49, 0x17, 0xffff, 0x3, 0x4}, {0x4, 0x4, 0xffffffff, 0x80000001, 0x9, 0xc448}, {0x0, 0x6, 0x0, 0x1, 0x80000001, 0x5}, {0x101, 0x7ff, 0x2, 0x10001, 0x401, 0x8}, {0x1, 0xcae, 0x100, 0x65, 0x3, 0x3f}, {0x1, 0xaf, 0x0, 0x5, 0x10001, 0x100}, {0x401, 0x5, 0x10000000, 0x6bd, 0x4, 0xb65}, {0x1000, 0x1, 0x7, 0x6, 0x1, 0x1000}, {0x8, 0x9, 0x2, 0x0, 0x4, 0x7}, {0x9, 0xff, 0x7, 0x3, 0x3f, 0x4}, {0x1, 0xffffffe0, 0xb04, 0x4, 0x2, 0x8}, {0x6, 0xffffffff, 0x8000, 0xb8000000, 0x59, 0x80000001}, {0x5, 0x6, 0x200, 0x80, 0x7f, 0x21}, {0x0, 0xfff, 0x8, 0x40, 0x4, 0x8000}, {0x1, 0x225, 0x36, 0x2, 0x401, 0x7}, {0x4d8a, 0xff, 0x1, 0x4e8, 0xe11b, 0x3}, {0x7fff, 0x8, 0x20, 0xfffffffe, 0x1000, 0x7}, {0x9, 0x8, 0x5, 0x5, 0x23, 0x4}, {0x6fb967bf, 0x5, 0x6f5b5bb4, 0x3, 0x1, 0x8}, {0xbc, 0xfffffffc, 0x7, 0xca1a, 0x1f, 0x3}, {0x9, 0x6, 0xff, 0xe4bc, 0x3, 0x10001}, {0xc28e, 0x6, 0xbe, 0xa00000, 0x0, 0xfffffffe}, {0x0, 0x6, 0xffff, 0x8000, 0x8, 0x532b}, {0x4, 0x0, 0x4, 0x5, 0x9, 0xffff}, {0x20, 0x8, 0x8, 0x400, 0x5, 0x8df}, {0x3, 0x642, 0x4, 0x8, 0x6f, 0xffffffff}, {0x81, 0x1ff, 0x6, 0xceb, 0x2, 0x81}, {0xfffffa27, 0x3, 0x0, 0x6, 0x5, 0x569}, {0x100, 0x1, 0x1, 0x6, 0x3, 0x2}, {0x7f, 0x9c5, 0x4, 0x4, 0x1, 0x3}, {0x0, 0x6e7, 0x3f, 0x6, 0x81, 0x10001}, {0x9, 0x20, 0x0, 0x999, 0x8, 0x8}, {0x1ff, 0x80000000, 0x6, 0xccb1, 0x1000, 0x4}, {0x4de1, 0x9, 0x8, 0xe8, 0x7fffffff, 0x7}, {0x9, 0x2, 0xffffffdc, 0x7, 0x7f, 0xf6f}, {0x6, 0x4, 0x7, 0x7, 0x7, 0x800}, {0x3f, 0x8, 0x0, 0x6, 0x61, 0xfffffff9}, {0xfe, 0x9, 0x1, 0x2, 0x7fff, 0x4008}, {0x40, 0x8, 0x3, 0x3ff, 0x0, 0x10000}, {0x40, 0x0, 0xff, 0x0, 0x1, 0x2}, {0x2, 0xfffffff7, 0x8001, 0x100, 0x1, 0x8}, {0x3, 0x1, 0x4, 0x8, 0x4, 0x2}, {0x8, 0xfffffffb, 0xcd, 0x9, 0x1ff, 0x7fffffff}, {0x5d, 0x9, 0x80, 0x4, 0xfffff801, 0x5f}, {0x4, 0x8, 0x1000, 0x8, 0x8, 0x6}, {0x9, 0x1, 0x5, 0x2, 0x401, 0x5}, {0x80000000, 0x29fa, 0x5, 0x200, 0xdf6, 0x1}, {0x101, 0x0, 0x5, 0x6, 0x10001, 0x8}, {0x7d, 0x8000, 0x8, 0x5, 0x7, 0x9}, {0xffff, 0x7, 0x4, 0x6, 0xa73, 0x40}, {0x101, 0x8, 0x2, 0xfffffffd}, {0x4, 0x5, 0x817, 0x0, 0xb6d, 0x2}, {0x6d, 0x8, 0xf, 0x10000000, 0x1, 0xfffffff7}, {0x100, 0x7, 0x5c2a, 0x3e4, 0x10000, 0x4}, {0xa37, 0xd4, 0xc46, 0x9, 0x5, 0x10001}, {0x0, 0x2e4c0000, 0xd31, 0x2, 0xffffffff, 0x4}, {0xfffffc00, 0x9, 0x0, 0x1, 0x7, 0x8}, {0xe66, 0x4, 0x0, 0x6, 0x6, 0xffffffff}, {0x800, 0x0, 0x80000000, 0x0, 0x0, 0x180}, {0x2, 0x374, 0xc58, 0x8, 0x9, 0x1}, {0x4, 0x4, 0x2, 0x80000001, 0x7, 0xf0b4}, {0x400, 0x800, 0x1000, 0x7, 0x8, 0x5}, {0x8, 0x9, 0x1, 0x6, 0x0, 0xe34}, {0x1, 0xffe000, 0x200, 0x9, 0xd4ef, 0x7ff}, {0x3f, 0x80000000, 0x7ff, 0x40, 0x1, 0x1}, {0x1, 0x80000000, 0x8, 0x1f, 0x3ff, 0x3}, {0x8000, 0x1, 0x400, 0x81, 0x54, 0xb58f}, {0x511b, 0x8, 0x8, 0xfffffffa, 0xeed, 0xfff}, {0x3, 0x10001, 0x1, 0x7f, 0xd54, 0x7}, {0x4, 0x81, 0x6d8997ef, 0x3ff, 0x0, 0x9}, {0x8, 0x3, 0xd2c8, 0xaf27, 0xfffff801, 0x9}, {0x1, 0xd1, 0x1771, 0x5, 0x7fff, 0x80}, {0x1, 0xeb, 0xfffffff8, 0x101, 0x7, 0x7}, {0x4b6f, 0x0, 0x1f, 0x1f, 0x7, 0x9}, {0x7, 0x10001, 0x0, 0x10000000, 0x0, 0x1ff}, {0x5, 0x9, 0x1ff, 0x5bf0, 0x33f, 0x9}, {0x7, 0x3800000, 0x3, 0x32, 0x200, 0x8}, {0x3, 0xfffffff8, 0x4, 0x9, 0x6da1, 0x400}, {0x5, 0x0, 0x2, 0x5, 0xfc3, 0x8}, {0x7f, 0xc57, 0x4, 0x0, 0x9, 0x2}, {0x2, 0x1, 0x3ff, 0xfffffc00, 0x4}, {0x6, 0x800, 0x4, 0x3ff, 0x4811, 0xdacb}], [{0x7, 0x1}, {}, {0x4, 0x1}, {0x5, 0x1}, {0xb}, {0x5}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x2, 0x1}, {0x3}, {0x3}, {0x1}, {0x2}, {0x4}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {0x5}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {0x1}, {0x1, 0x1}, {}, {0x5}, {0x2, 0x1}, {0x7, 0x1}, {}, {0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x3}, {0x3}, {0x2}, {0x2}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x3}, {0x0, 0x1}, {0x7, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x5}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x1}, {0x3}, {0x5, 0x1}, {}, {0x2, 0x1}, {0x3}, {}, {0x2, 0x1}, {0x6}, {0x3}, {0x2}, {0x5, 0x1}, {0x4}, {0x4}, {0x4, 0x1}, {0x2}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x4}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4}, {0x2}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x1}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {0x1}, {0x3}, {0x2, 0x3258ac5c0b6d6fa5}, {0x5, 0x1}], 0x1}}]}, {0x79, 0x6, "0993ecd63911a56c7ae86daff02357c151603f8f50eeb2e62acf29ae190598db3104b340679dfbd324057d65b3a92d498bf35888b45faa5f48bf7b7c9d51ecd150be6702af57a2b391d65ff5d929d5b265c79e6c372b97a3c150fc71397905ef6ecee9a20561a2c2c261bf297c475fb6dee6aa87ba"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_vlan={0xcc, 0x14, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x5, 0x7, 0x3, 0x5, 0x59c}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xd11}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x4, 0x6, 0x3, 0xd0}, 0x3}}]}, {0x58, 0x6, "78084f133122aa3b9ef0946e475b7acfb7490b23401cbc17407ffb61d0b9370f09ed127af6a1ac192cea4ffd08e8ff831eaef52292b40940004e3b95e5d1072735ad9d3e1ee63db1850887fe4e2c52ab60664fdf"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_connmark={0x1088, 0x1a, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x58, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0xfffffffb, 0x0, 0x1000, 0x7}, 0x4bd}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x400, 0x361d, 0xffffffffffffffff, 0x200, 0x7f}, 0x80}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x718f, 0x6, 0x3, 0x1f, 0x7}, 0x5}}]}, {0x1004, 0x6, "c377a0ac877e7a59ba67093c92f0ec187a9d15957eb7210a27cb7b0b8343040b1d712e22667b830926c510a6273f9106b397ca1d76054572e029bcb2dd026a50d3c02d5b0fab3c7ace7fca794caf0a203330c017f8ae828df03c268a67af278f9b73d4883df718da4ebc8eabb9be47de70237bc0b67c0f2a090e5c3833229cf0295b7b7bd036878dec7c2b6fd1e5d1389f7275bcbb9bd2f2ca679201f623bdc94f795959d2db1cf7cd202d7f9d854a2eff2ab17078e31a2be7dac0ab56950c90ef18689cf6e2944049c33612137b65891ff95c9cf069191ca7b86c096bc603dab0204b88fec7123e2062fafd4c88c17fe5c2c36587b7a81d3d2b142b7a8a4d00d9320a24171bfeb1f4eb81b7f691b3cd9d05a8ae9fac6749e6fec0e70cff0ad1c7968f8ae02f3712da7964e15b7566cf637ab03ed6d5450695c74f24b1d7a46bb2d5614a7f3bad62298a2d1ce611baad0ff4752198a2922250446c0bcf4be86eb28b21f66c70b7d2a1225ed0c505a0bbfee3cf4f58f54123fe8fd94bc2fa3d423f40dcb3d0c06922a5ffaf09515f0cecee31447affeee47daf7e3035b0d1330dcd85437ce3f0497030e84ed0b27b2b44c79ea5ab0532426bd787b695052a952e1a6ff27a99791dffd90507496b15b9b3ca034aa34f5fc9930605eaed9bc027807626554d0f9a7406320b5da3f5e45814315a9b85f165bed276c7d7ab9515c04dc41e0f0edcf14e856daf08a4489baa7cc670c84af6950301be8ab79c66a1c902a2808d33561c5e083abd19f58179209147dc093c4ad20cf7ffbafff432ed279a55b5686867aae6670dca52fadef2a4bb408a4c6aab92461f9c4cdfc17c292c7d25b0a0fd9f13fb4c895981fefbbc63620bc8219fae8e7ade9d1c2ee214ca11be2d2c0535cadbff67e90f35018b5300f0d9095e53b81532494c61b28c0bbcb0e0ac1c8d53263c68b2fc7af87ce4baf2673d8e9c3c2b667e3aac5772b580d90bc7b89c26e3a31d0d9028653270534c0806519630a9f6a9a3260d363e3a6b0806e30e467e1ad9d6ecb6103175bbd36df8c7f2ece311e9e28c3f6dc40c53c6b3ada88e8bb46d600e5d8bf3a4477430e044bf78768e88f2f61d355f2e5a5f39542c9a942f0dbf2d8bd54cc5f49ccb17cc2be8fcff1d7e9c6f3806c1a6c784bc8553d0b2936508035c112d5af9b84b7cf46d0d5c181af01f0fc8239321f6cc852bf37eed4baf6486aa433a0a1d03d65230f6ca83cd5f40aa075ce24b49408dfd058e2bf99b5301cfe5a0555702fe89577a9a7439dd6bdc0b0fe2942e3933e7d82fbeb3c53b53de8f66785cd4797e999ec569c0d4223d25f6b85eb8f76885c8c8cc29a5f35e8509ace339205c0b2738bb21950aaa88eb7ed9e5410b2002b1f56a918e48472e4a006960cc4825bd408f9a78f4f51553c07e08bd539c354166258d067ac64d3669c7023352bd28bc95bfcff1f875463337ba9fa37a3413aa3a4c9fc60e5f2f6bf128010ff5f73b6778c675f307f79dded25c1ef71fdb52afe2388c3f4ca10f524d2d1811756b111e4abc68149a852b4e18566dc22f88f431a44e613c41322b6c27f7e26d9536d39cc53e682fa7baefb696a6f98aac01c4c2ba6a771c32994a1101b55d0810969f643fc2061d97d50703d89dd4dbdd9f1057f630777f14ef2aa245d387f177ef5f813311da7ceaff3d12a6ff70d58514a8b43afbc2cb438e707420dd38f205e712786680842c2f346d14fe339727c1d73d8aed3c03ccdfc236afbeb55ad84c2b1a56033c486b816851a58102169baa18aad8494b4c4b58a011a2a7e6ba707050162dbd4be07f6eb854ea72952d816dff149b721599dab9b1116d17dbd8ac33a29a461a8d98a8cc5ff66014e8d1a535022d79a2e4ce7cd6163d1bf9ab330bad300dc76ab5a585073f8ef2633710a550e3301e71107015bc2811e0bb7965cb4e232c3ba6d52ea5fcbaa8b9f419edffa3f5642dfbff9294c93be9fc75c331ced671f6618ed137a2052f98688f9e24960fd13d67e8fc485aee49696c0bdbfae5083799c8a27324e48c7108459265e350150a11554eb83dcefbd84bec762caab3109031ab8a8d2bb995c75ccfb5cae495d4503153066486135729d0c016ce18377d19d93b1445b79d41189fa28cc9c53c6d7b644e3ddb6b071e47a4a58311688ef77e912871e811b50b2dc34ec89d9f182967b89cf6861809246116daf31f7867a1c90a3cd32d362ee46339fdecf1c01ab854a54b3b851e27f0148d40617d489dee5bc06e093d5cc371ec69fd9a016987a8e27173edf7bc1f4b5476f7b9666a6362789fc5dd4102688b035c489a5b1cdfff62cd6787459b3d042b259ae2f629e3f6de5ddcf471f29a8b671abb5994ba51a92820d89a1a1184441481e695a7af9a0120ef88245110e3e01a9781c3799e2a6dfd683d1604b06616b8de2f3c74d27886e8a6d793b7e8e488eb8ee1926fb656b5d553ec1602aa5d52e0d85e8512d3f42c74b571150c821de85e2ca85eeaaaf6d78d71d06b8bc4cc8d6bbae57513bb3c2cccfd9860185856075c5a4aa5f3e6eea3a032cc2334b355447ca1e32b018fa4003be01f1c7bb2483e9276150d8a463a3edf54f878d7fa15f11b13f7b347ca0d45d3aaa88884f0a08f42b90f427719f2b698340aba5588b563828e10e35472d9d7be102fbfcd772ad7a03ee88ce7e7d762761312da761bbb199c717423720850829aa8e8f420ee689cfa8c3982b49b5fe62457ffc0c3edc8b0c88313678d9f6881b7f08b8e3f9f18c3d306e51da54cff7d313e61989467cd0bf1fa53fb2844ed4d9a380e1345a9ac20bf72d3492974766eea16a2d6264cb22072e704a4c43e8dc8ac37e1be4da4af8deb4867fca9a9e3c66adb9d6d5e67706751cb378459d0b32e715514439070503d95b04d4a5863d0463e224c519de6532e5349d0764fa7f77fd54cbc5a4eed481da14c57ae109664f5328ee683a28e09710f528de426c2c353171a683d2f743b2e90be9fc178843788aa22e884f48b0ee833e83d20ab05117048c1a5f2cb0a93e227d157ad836c9c41905a06b5d7d79b8cee7a3107054e89a16db2e73f10a5001f539a5d65e38dc0a427e6e36d1347df7c2a3aedb7cb5289baa692613c1d865fb51ac61d15d014474af22add834a5feb6d39cac04c8708af781df61ca29bfdf2d1683995ae1807444f1b01c054af82aed8455954c9730d6b54cbc70a13c8c0d7193b2d41985f16e8b6e985d1fccfd1e9c30fd1dd0fab44aa03b5f2ffee7e41478bffd38eb023843eb097ae6c18f3f687081cc5ecc11dd1e9b8ed15b5033a826f3ebd34dc402da55dccd3c162bf04ac4029f5ffd16a8205c3d8aaa3a4f305c076689db8b1778e1c9a50c5e786f401fb02a6e87633b27db5b00486428200dc4a936a437d8d31079aa9b1a314e4daa5214f10840afd583d276dd821af7781681f162d020488bb4e3f8c68f5652bbe3926961c324a4da430f0d2944fd06e675db4d622363a7d64d1bd0822efb04cb6c4d2eae2432aaa7188a9eb065b22eaabfa74378bab2257a8335f6a268c2fd192be57168e42dc5c07b76889def703f6e043171fa9647fdc0864d2f38facca87ce019170a09c4f94ce38c7989fa67413109be895bccaf4ef835cabc1dc42178a94564b4c388552ceb6f510d1d8e9a5c2b1c1a016467aef0f16369340d4cf8fecdb4feda3e126c1d9a07eba6d0903b47faf63b3392c715dfc7b1365cb2db34810025a7627c833d53d0b48414b0ba6d92b16645239975635c08c164dfcef26d29420e73078e6b313f4dcd9fe197efd606f33c7ee3ef15cdbb80eefa21d9f6708331a0f729125808fe8ae7e1193a4825ea25a33745427dad20cc62967797cb7385462f36c9d0a0a745b296ae22e50e394a218c158b412b49bd82dde25eb7b6162d7c28396012606dc295cf6bd01d7d9736fe237bf7669299f424094770db1c4db710a27239449e45137a75aee8d99220d07a45560468a66ba6465e380128bca84f85d708655ce878b40778b0b23dfd25eba2691481db5711a01e6be395feddaa9fa713370785ca0cfb88223a1e80b9bd9a3b49c2707de0f685a38b76670568ed5b14e804d7748fd4f6da8bfbd68811fb3378e44a102269cc186608f86f1e2ba12f11e0cec5b555d43f7dd5e0006e904dcd5cea3576e361a8f54218136cbec3f601f73df081734f02e453a13b27ac7420cfb39da86da2fde320776cb1862588c0953a355351b3d9d0e848a7bda6cffbf3a3930ac86d7e08797a562c31394d165c86f473a1069381cb1f316554bfd0c2bd9e33fe299c4032a8e98779b8325f63d0432a908cddba8b476447231670c5d813343cfbefe45ca8461b6086562117c496fc3cc7740428ab5112bed0fce866eadb42ff3d2a71200f0df3374d6f632af0fa4f1787da8d75f92ce22b84f481757f0d08a3e885219dddc7cd71d55163194d623a8a4460cc7a42da43692004f0616cba1e54c37150a413dedd3ca53809aab98aa478dda91da88796b787b71615eda887cc4b3bf2332d6446d5a2e709ed4d578f1b725bb463895f8f430d2dbef40cfa1be0f832719348992eda9599fdedf2e10530e55b0024f0e051b3d50b816230931b71fb8f68fcd72735d9a9bd877c992d2535a2060256d8af37c737e61dc929231d4fb37357801c514d5bfe3b872ea64155ff3f3b173bf4593133c16892f28a855df5e651d5df4b67ac13c6ddaaae4c495d596363b5b094f3edf8a20eb93b3f411ec8784242b52f6258d3e0912fa4ae8d08476b389d3cd19dd1a3b2931d7ce0b237e862937f41200ffd40fb7305df9dc3262dab2611d9cfe2e1324320ce3b053a2ddc8fe058c972e5e9209191313dad09bc3ff55d38ce491cc7e645ed677606d0a52d0d9d5f7464ca27b5237b4d14e398482edf7233780d3a5fdf07dcf59a970af1ca5534cc22547fd522ce7394c46cea4520d90d09e6232d900956817085fffe247e253f7b228ebcf8b7ccdd6a9f8dd1b22d62ca451e42ab56a3af99bde60ce6ea821fd77cf5c881a489df5b52dc9d1f25048db3f4dadf2f35910d395333a2d701098ce7a8ca39d779b8a082fec87b4b1a883b49a399a92c4ff4bb74746aaa3fece0543bd123b91e6e4424e347f6518bc8034c1958d646fa819a494540f0676c1b4c4584c4ed6f8a77692d7ad57ce0b0f55278ef7139dc7764347401f3dba7a10753199b0a6e7205fe41c89951d60f9c366a93f3e48174d40898018e89a818784cab6d1fde68cd57100f33a5508276f11fbcb4e81ac57d81ac533a17fcc283f0a0ec176493d145c4f7d1b459401ed7f9358c0ec60146653ec34e52d373f6212708a9f44a6dbe0a01faccae9e9b1b4f8a92ad4bde4d13aa2564807ed2e3584805ae0d5954fd72729970f98ab9770b4d9bf26cddd44b064547c4b1b79e5f5fc6b9001d370f573d640df9db2b0b175614a817f6649d0ca9aa8b8b5eb421e52f5b86cd061794367ab0eef5f9b232f10d97df658ef66692a9d2f0d5a62a42bc61296ecb8b86a3a9653784568fc5d073f741cd5b5a875cc0b936a0ce48c1b06d5ff24eb6dbb45ececc91888b3b121eb0301504fa6ac6cf4b9f52600ea05071d481271e54aebce6a913f3cdb7f9292123382520cfb7e40a4caff6aefac29241223134bed9724034293ad56ad2a7d64ff78a95ba1e4c02293e63b436f74af27294455905d5b56c578f842c4e5f54ef8411110fed66fe072d18b6cad1f830aa061491ebe4a7903a9b52a1ddd1da880bcbe7c6e080347d7f9cdcfaacd27"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_skbedit={0xd0, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x8d7, 0x7ff, 0x7, 0x6, 0x8}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x5}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}]}, {0x72, 0x6, "22557e877e8e18d46bf86896a6ff1e55e96a7f304adc0b433939878260cff2190c805cce00e7557f13e7a219a94306d054ca8e7bc3a6e08184d77ce12f22a015261b17e05b239af56b9ca1b9f3b9d1d27e70c97b069a288cfe4445893e18f6069a950e9045834e650d3693c39995"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_skbedit={0x1058, 0xc, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x3}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x8}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x7ff}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x20}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x8}]}, {0x1004, 0x6, "f1b1d84cdcf2512a7011d6efa7b76a9e6ff3f59a179a1a2f039224340dcd602806bba5896b8e2969e58406ec06f28cee6493b754ed9c1862c1f0d90a0efc47f6812ee765bd2a956dedb3f89a0941149d580dbc52951d6058366ee764ff99194d87aa844717b046465052dc1a2716357ef9ae4621d622e5cf8b6d9d8bac7b061a905c5a1207e1f8e3d74b17579fa309425f7d3f732abfa207852e931b8d58fa2463e1d505274dcc2102e1f820691515a59047cde6a857c8508ad737d183bcd3a6c7df190b190363b16320b5497832425d5dd6e7510771269c6efa6af666bf831ed0137ccad470cba2d9e486187ca52614a40bcfb4c3ec9d184867abc039992b53977110d6e24d14b8b533f8e02e657999d2c8aaa51c86c078b2fe7ada31881c6003e90c96040ffdc1d836e7ea60d16e1dc7985fb4e1113e69deeb4ebffd7b361e5237f2b34da2064c9644b2c5213f0e22397e33b38d508b0e9745eafb2be98939b5ae74f21748d5d8038685b859979d01831ba23b30a0f7189b8be36d5c94fb62ec7cd148917f2deb667729a519362cd388b2b2d99a866f10b842447fed45a3289848e8bea3759bad4abf671a9eed27ed3e6f6231d4283422a015c99a3912591b75e5115c616bfea8d20faeb3b3b3de74bcedfa30eb7427fda6cebc57036beb1330db47b0cc0e0c4f286c3faf7fa4d779256ba98a5a1af31a08e71b19db153aefa1e6e8281224ca4b2a07c75449f2c9e66960f767e3e586b70aff3281c8eade8f5e90eae18848800bba7f1fe4cdf2fcd91755c53a9cc1f3934eafa17c129f06997aaad1dfa4dad79a743edaca2d0698a58573ee22eae8afb988b9f5a936b8caffd412cb10a6df7afb206e3592b29587f82cab498b8c3177d96a27bb9385b9c0a4bc28a40dc95909dd9da278ea5fe98360f6a3d0bee4a9e2eedc3f8238a2602dae0170186f032ff35cc4b0dd4ec102e2fb35549b7ddc03cdd21b312367b4b83baf98c2b779e11b6e85747d2ff0b16f9152cabb06e87f473a89156f9a5b2fb9cd6ed116000212e458ff48bd255bfb0dad4b916f4e726f6e15927dbb88cc077ac83a5bfa70d0d8273bf6fb0008842ef0bacb366fcc917fda74552361d84b101c9990c5836b106a4697e9d8c049aab40a473b6645e1f152aee4ef05247685a35110cced931f9aab6863cc78d4c71d2139b3aba54a5e95cb41f2200120fe136358592f169649d070fea164ec819a230faf519dc87fb8e79666572cf99a49661acef58be239414d9a89f34f1052111c64f4d6873d1cdc861f07c3e8c8ec6176659507d597e8571e61ebf579338f05a378b083672c3523a5c08e3e8ba2afac09374b3b98aaa946b2c5b1dbd158a1ea7cff51b9becb3bfde719d9340a1158ea8c85add17dcf9b049768ac33a0013e14b3925b8c562183f09b8881f510418c3c13a19e354693792ef2e70b1b6051e5d627ba2f6806aabd2b45f90d49dc0bc49b4197880c30b048cc2dfc7e824764d1158cfeee91557ec0b4578492433db894174d169f1e7717adf5ae005efd0c5c45d4f62a7aca3537961e7ab49f836cb493eda2335b2855918e7271ba958d1c27c97447062c3fc38f0efd2db6f7b6ac641f02620eed3faf2eb2604030177112ac197f165817a80ce0a874de0e8d1d42feb1cf24bb6b8e51320efb8160f6a23726a2b68f7cfe3a8d48860b410610a57e3228383c5b42af577af846c9843a8a5ef9d8415e9ebe446844f335d3e43c8a46f814347035bff575e76f48c74023b6d2ac89424975080dc821a059e8414a9b0fe08477b614c0098ec739f3f4ca7cdeb9c11fdafe15849a6b9a2ef60af6b5dd3692744c8adff5de00c961370d606792be593bb54cb128dad6ecb7314b75370898b6ff2d4445cc5d626c7fc2c63cdd918bfbdef0125ac4eab0e76620651c15f17ac8e411dc70f2b5262fa867f7a1f0957e6cbc181c93ed275fc45d1ff24b2eebb07e001485649fbd0447fb1e68734ee18e6caecab76d5629a5f50fa4b3ef14067737229f226769e495a000422047725a9517c5cff15d6e16339b91a4c7c35216a45824b61ae8d62d512392577b3fa87592ffcc4c47ecade078d733e0dc30dc6784f9423e5c2d944a26a28541cf5dd88b9b990a3099640c473292c4f568cf030b7ebf0e00a8df7ddda5b078bebad437c3cf9ee528ef67972836c4ebdfb383080880696e291149511d4415e1e1bbbcd28636d87cf14cdc98b4a93bc64850e69471a31744c73afa83a6aa72f04f99f7a8d709d6cbb3bfa0d2237fe55c1a4b4831eed31838f292b1900a7e2915580770387642609f0ccb0cd9f95fe45bed6004ebcca14308feafa49f1ed7a8908a1b70cd764f82948c1374f6f43bc4fc53a3fab68b992383fbe0568bcd4153eabda412ec2163bc0c18c99d329e1c2cbf7af7c0cade0e280468024d86c3a7c10d025e5d506f3e6dcd6cbc47279abd6020bf0e72f654dab1022f5b352b5d0e2b387410f4a2ee139e78599773d6a12bcf1764505d7a1a8a4c692eeb04f35d79418e45565f713b3221769d7ca61a0a252bbbb9c5cb79b5f5f7d722833217eea22e0ab563ed0e670158aacdc7d08dba61384ab4c6f847197f4a0cec260bd20e9c19848e89749d661e2d598e3d43074bc74acbd990e493b8b88e4e82c77fa961ebb8d951e5c826ebb0f3f23608174bfca4ad20204ebd4e6f08b6ad2aebc1ebdac2c01b684ec896aa26dcf955afd87f760a8fd9db005278652c4fb0d8d1e0d25860ba87c38f808b428678149656a4413bb5a7734fdaba0367ea48cee889bc5259cec494b61ce756494bcb4121fbf074e68804e1ff4d8d4801ee3e8152d05c042be2b97e88325c5384c1887cb99cb15fd1521ecfeb6325fb1a25353d9bc100576b422b1137abc2b71031501b5a8c5a1a26f90ae65508a975159357d8908553d46c2eb88237f96e400bb5c2441f0e31128fc6d50fe7e640549260449707fa5c1bb45ce7791a129f84e2b2897aa651335305a1600fed5d8d801c252c2d026eba20acfb3f0886adc7a862569db63de95ea8e025d6978cd4eed0a7541e1c047f59349011868fdcdc2044854785a8f9068475951589096c4fe23939c16aa4344f327e29e8fade73d3a82a823cf8026f78a403513ebdd5d20bc06f5f5abe6aa748e6aec065cbff7bc0133045c7895499f462b6b13d29b2f4ba07b3f78d53c9f1c69b0e4b8e188ffc701b03988482cb95c6c75140efde0c2283e9e7eda845835c10277fa0253ddc73fd50475ed7314e0738f49e739701a608f776a0c63936b81ea7131ec1e8060c45b25918b38361c394d7acee92cd4e7790a9efc31bbdb8f19f54398f21bafe4920dc882e6831d89e2e7bd0fd4683734bca778cb90e2e1bb866aa4491cc472fa6654ccfc9b23d9bcaaaa989c446d8b7f9cd51267d9e5a2dbf3a6f004d4a0f308cfb7ae255d200ffebe3d50d1496c85c3a56d42439c3cf5472ce05d99312ae9a1793e0ed4957671bf9e177577d4573b4d36e586760e2108a7ac9ef2205ee09170eba9a32ab1f524cf572be93e3536d85eb4e390e8239fc75b3405ae03c7972599100bd51b1dad486a978c9451218db68f48f4fe98130e7345b9d75981fb1fa76a29ba30f2b6e65bcdbda0052633447988db72e00b731a7a51ad7c38b4e6c382bb8c2f04dc0ec917a58b40e1bf9a6c6c9065ad3fb5b06f205b394f1dcd7d04c4cd7aaecfd7484a339728e51b30be23f8ae9ad45d8a2549d6e73602fd23c3f7295abf78c2f9deb5f4a7645c0c56b8ad72e84ae0fc2e55d0a152c4ffe7df5f2fe5beef33c923232609f4dce6b829013201e18723bcf75b5169707e640f0c1707d42764cf55906ec4d4afac40258df3472be88752060096f84941d679c970379857c3a803500cab780c7c8642797022ac5a1a4e2a86ad9003d6e5175ccf324f4d9fd61c86f7d93cabfa46ebac4d07552027cc5e1e3f68b724479bbf8ab486ffb12b9dcc738796cbe29e9a4d34178ea5e6fcf49ad5c126e852dcf6324c0af12c8ff47144dca5f467fbafb3e0f397a3d8c96eb2073caa3454d3f5a6b1e4f1d6788bf56c67776d793df89bd9a7a5b421cc7af586e5b93d4ea1cc9279582b5d054301f1cfee7fd8c367986ec76ac54cd46d441189ea36e2df5d62217691d58de875491e4733708277668becdaa04fcec10c34176eb98e2ffadefea523fa108fba34a126a3ef4fa6a37a68eb5c682b73d3745e4c90cedd9af68350806b0a408932426631824d445ea13470b4f3fc7f060dedc317f4a8ca7b29e24e54001376575e2115b519d1ec5fd3dd90028522682e089ed50145336eda941631e3173739357e224ed1a0fa5ce2c4ef28e3e5a324f298ee2afe628342f995c7d49a4b294f64667f4767d8ae3e00832c1d2234222b8a403804deb954d5c4c9942f46d3b99ef76f3afe528ebdec47c7d1ad4e8d33563623542f1b3e61660f7077a14e45a0f137bf4173e51f4126abf434fd9a50196d419049bc9add32ce8b5bddd1ea1c33a38a23a7f00fadb8ef12e1987517acb773852854d1e983e4632632e686d72629ce0d4bc5c0f1920d895578351295ce0905513dde3d4fb1884cc9dbfd5150215f554f37da9da8fc1991c769bc7807e4b7169741dfc54e8c733972a471d5d379f3d45e653dc371f72861fdae5ffc4320e6cb9f588033073c3d9ed3bb35371070e92174350072fc661498ff3958ead19f575cc728c55e275903006d89cd387aba5f6ca53a3145fea675e35f950dc441108da2bf9712c951b60324eb9086f3024980e15dc98dd7dafb404caef1758e76327006965c8f62baa09ced450eec2938fe17f7dd25d48fccd7b1e8fccb63164b8b89c88fdda63e787ff5025d945711f3dc9c246e7e104e2ddfa9d8b2e3478d95db0fdb4752fd16a216da532367c59e2bc981b94a0da44a3e40fb51ec543b82607ecbedefd9c6cb57d74b4ad7f744c78bedf9661aa44fdffd3e31510031745c18baf6ac39bc7bec279322fc6124dbddee99ca450f1c8afe0c81fcf5b0d9305eb083c9b2955a9955223b75485cdcad05103d416675d3f9a6d6e68be4325e241093889c6d04f8935d03cb43bf8f7299e955ebdfe08f198ef6d074ad51a191fa722c6729657a830d493a9770f11d31e361d45496d4f0e0acc7d3239262f8b930998834b1aee9ec9e9f2d1e6a1ae0b53358a5ad7bb574c89b5103b50d8fb23427d00eec231a90cb50d2e2402aab7ec49ffd5174caee2eff151e1716adf58579a1894615f816649672ff0782a56ea257129e615f6a073a72514f955ff3221af505142b5f2fc7dcae2cbf889fa6fac2640579c8117ff3ad214dabea990de73f1cf4df17955b3af65450daad3ffcbcacee136e785c5e70dfe1bc7b99d07235edf9a9e37aa61d4f6d63ee7471f0e5133897500774ea41d70e6b2b8ae72fc4dac091ef32d32942a2a4541149685f2355c02faf7431e2edeb94df864c592d5d1b293bfa91de0d0277326ededd7353be10061377ddfc103b77cab8567f3052f96e9f6d2e2682bb20262d8113a40410c2761e2df0510a716625e3fa5f9b0531a7694439a014e80cfa32de3a16c2ba16b57b097f7c928a6e58c844c2014f7968237a408c98e11ddf278a7531b876c41a3b99961c6ca3c2c70745eff26e4dfa47df546017e588c0d1560053c9d51bf0324d4821072e4e0233570cfda12de9974a88a3c6357a410551d9ffd1436fc61bdf9b5b8b962ef8bbb3c9b9b906a28eaa4708bfaff47bb9397827a5d3ccf85e927423a5ada387c5bd0c6f574d11be2cc"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_vlan={0x68, 0x17, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}]}, {0x31, 0x6, "0d2641d78bab5ab563b3c724e63d421a60a2737fa9a9004f4d4324e83d9a6de6b1e7757635648f126ebde22f5f"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}, {0x40dc, 0x1, [@m_ipt={0x240, 0x0, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x150, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xfc, 0x6, {0x3ff, 'security\x00', 0x7f, 0x7fff, "a354de7c85e741029c1e607786622cbc5d04008fee65176dcc9c510c52d1f650ea3ca2e502c05aa015fb5bb06c292dd08a38f6218250c8dbe85964eaab2b7a324dcd43c0579c136cc7c6815357cede1d206446552fe61110c6029b9b9c6e471007c0775b1a7bec14e74666d21aaa2f4149da95ef9549c558e51b207b7e9e8848f38d7bf657231decc44838206494df702939cd14bfdfef4a87f806be81a7f4567b686c5fa1b60a059bde5d52483b67076c782734aa4b3a080a3642a62d67ff102f34f2fe81b3ab43ae5677e7a84d1edb9453"}}, @TCA_IPT_TABLE={0x24, 0x1, 'nat\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0xa185}]}, {0xcc, 0x6, "b525327b0663eba59eb820986cd03bda6f9b9a86898307f6504dfb1d4ff8678cb7ee8eb61ab730d92a9c99dfd885d4c26940147309aed5ac53ab76d258118536b3d31d0e22c15e9aa10ce79ffe1e0a415c2fc5b63ae5ea3e33bed410cb00bcdc745c8f0c9e67bd9c1ed3353687155103e4aafcde343bc0615b8c2b47ce0a7bba54fd8bf9034ca35b08c64266918472406519d53ec7c4c337d2bf1b32ec9b1f76fbb3faf9590ee9024c113aef73c1f15fae62009d437cad54d9672615137131c527141859011f713c"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x4, 0x3}}}}, @m_csum={0x112c, 0x17, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x100, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x7ff, 0x1, 0x8, 0x200, 0xffffffff}, 0xc}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x7ff, 0x4, 0x4, 0x1}, 0x6}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xd6c2, 0x7fffffff, 0xffffffffffffffff, 0x7, 0x3}, 0x79}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x7, 0x7, 0x2, 0x5}, 0x41}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x5, 0x8d, 0xffffffffffffffff, 0x3}, 0x77}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7fff, 0x1, 0xffffffffffffffff, 0x7fff, 0x1000}, 0x2f}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x100, 0x9, 0x10000000, 0x9, 0x5}, 0x3a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x1000, 0xffffffffffffffff, 0x100, 0x101}, 0x24}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x40, 0x10000000, 0x7f, 0xea1}, 0xe}}]}, {0x1004, 0x6, "949839cf820ebd29e222916ea01eb9a7751ac1fb21f9a3e3c943bd5a8834d7a230b8ea19e0cd70d6bce6edbda669de099ebae06711e48ffac692fcaa99a10f5b2a34169d42da919445671f0186ce3d527245818ab23eeea48e3353f7d6237466b033cc9405c4717d8f20adbb083d26eeb45b75597e091e8faf07484158cf61caed8f5f75041d9f9299bc207bf80b6c8a07b9930acb6bf70ca323f35a2fc3e6d593dada22d7485d58de4065fd1f4b2fc8a93c72b7aac8df3e47d52c4e617d407604424678788a9ba141a51dbdd1010b0467069ca5398043bfad027f02074e8081a1f909707a142a2f6cda72e9642c48b64b7e501b7506f106b1531f1beabe4ef4c1b6358d0ee852980ce3e0fc0c619574fe04aeae1a1f9bd158391f8d524ab60b726fadcb57bcb6c74039d583d86191cdaa500b410d455cbb2614356ad686ef8630868835576e43033ff70bbc8f64042d8e96cb7fbdb39d1bb9e3cc634b92a9d18bea5f84dd480c1411ef54fb178ac4773612e3bfda3ee67892c8f25431d1c66dc56c97ad94cd5adf32481bb39de1dd87beca729f658c7b67b37d38ad5b1cb8fbd0ad8293c6b0251a949a3d395a38e50d03c021017481a2477e85f79f3f6302ad09c7f91b7bad4b9fb77fb2425b2edfd6d22da3080f45e1f130382be8c3423386cfad0ed0cb870835c66c11cded29e76102b5e64f81c2b97c21a8085d69c9d5e6e5867cc4214b27b11f8e83d7354caa38391bbd834e0d4759312815ca3675c4ddb513e13b4a9866731e8f9a53ccdc21b65c4d9a74c7b2d92697e058bec13fe23de38e03b052ea65081b2f5b8a76784419d669f5b338626290da5fee5146295599c6c8654d8e7bdc803d4b516d82053a1fec4ce6817e802cd657ce49dd2fee2df530202bc48c4a15a25e7f8699bd0fdb6528a5d4a99223c821722ef3b455ac3c07bcd468b47af621c0cfd27ebf7c996f2a40513834d2b454b44ee791145ccf9f9541cf5426c5e6fe32672b41ffdd6652b6087e217724993cfba6ffc00b11bcf8cd6532a3a825afd77bae51b324f430cc3b4062b8d93cc393ac58b9c64091d4fe7b3bdcd7be98df1b98bd86a627a899917e22583e268c008a6f874cdce45575c3af7b8093360de9af89ff4ee5e7cb41792be352b91abc8d5814769e91a1a14c5ec3af65bd1588f1e246010ac9bceb09f52ebb33a978b744f0175b3a4b4549c56d06d00bf7039c8bfa6e73bb5cfbb2db9d539e7476806d294c34b95dd8a3b83910ac8f99183e3d34486c0f2d52223ec1bcd7453b623809e9063cb794e95c20ac950becb1db2b17d52707187deb82195adacb9e885425681711daa39c36ca51266afa15a0d5157ddfc966a4a2e3a99f2146d6a7258f2e65ac5e90fa5a7f72d0a4d41723a02cb5457f796e44c1b35eecee44b798d8d10834a1168af8e6ff0f41ac2b9ce8c3f67e8a62de274796f3207976e2023b5dde4c3f3b26991db426e68bab469b461c73bad4d8a041ee3a8e3713354c96dc1f89a37befdbdfc12b36a929fec849d9f12284a1c4c31e80876b7fcb89ae607896b53ed7416e03ef09683386c0f0dab438f7cbc4dff510a5df118092f4fda6218e8e4511e3e52b978985927076b853677fafc018d39d6bc453b0a57fd9ef6df9290ddff1175be04c68eb136121fe9f6549ecb4226ff1216b121e60d565c66c75e165138d7a66016706ce31ac6ef3a09404d6e3a145974f25f509b8d08c455647fb215496a9b52034ee7f1297cc1776f7d2e91c797b4ebc0f80f43d81ab09fdbdf74abed90ea0eb9d3776090b29f6008b008d4bff5661e65d77a57ba8b0d76cee21f7c933df162c0fd9ab50ef190c23d28f84a4323d6d8ec55eb3034cde614f1a6794975310d34641af45a0f40b03b1c880c7ae52526b8931744f2ad9f63a08ac92cb5f4735711bd846c8fd53ca04e93d50544d1df2da2b8a953011cd183f1232f35f84cc4e4e7d5c81c467f656a37927b4c49c2fc06de4797d7050d3eaa29ba5209a6c4e71e8130955f551f2dd9d9ed3b73e96d1d35e5cea1625d61d574fbad30fc1a3f913864d5bb7576825426b96776ce5019e88e8d9bdc402800d4ac191140b84430ced7a50acfe98c1f1e038d4ef5f3a5f89de15c54e8710bed454a35db1590bf3057fb70551f9dd14ea17b7f5ae982361940116b86888ba8f63e5f49588e026f562113005829342f7a113abed0cc43774a8fd45bacff3824a7235efb34961beea5090ce68e945d184a721f685f0461dda16cd7f1708f40d318f38c39b8a9a89fc4f69dd636f308490d7059222cca31156c1265db8b2cb67427335cc3f471b9c9388448cf7e0b07bbbbc13b3862fa5ad335c6c903db7ebb9d79c43ec7f98b0583f8c0aa02e0fb0269a4f9b347c8dc8a43c311190699b75d5c0daa03e163588f615d83fd74d655249ab960d3103f2cadb8683ee232b2c6d38ea5c23e98c2406b1f7e583b38063425672f7c69d2911c4cc9d17aa593ea35ca3189be14e32fdfd3f2b77e4be622e399a72dfd2f409a69e0e2d62f7a123187059b27ab1832cd714acb0dbfa037dbf36ba66fe568588995fc3c73afa6056fa8c4b1283e669f2e92e18cd1d5d1d7aa94e061a1689ace686327e37669f4ddee9dd825230b11eb37c3a05f7e8b7b81d4f7ffd185a86384e9c17e58852b1503bdb15ab2c41af718044c36c4435d7526d915d1b565b7f599ecfcbc0cfd1f6d2515693b3c89a1e63cdedc33d014430b3d2ecfd8bade3a0f4b5005f5fab92f794d1a25fda009089a4e00e5827ec71a22d68b06472288ade897b6689d61408b26b61e2966416c3d62064f6514fa7d4d16c80adf0d52e40009c1041e9a3e1b752682dfdd3932a5d9a614349ab301a0effbe629499ae96f6388021ea3c9310ffd541a978530fb7ca2e8cc71968420741e944fddb70d87ff4e548fb99bd154a38c4d4c042c1b7c7b0c0e899941da2d0b5b44a0c55934e3df2bcbb5952238da1ab33236c01ba0dda6ebae75e40912684b71da59ed7c6f26d6ae7a6cd4c9f9c9af9fe7020a60a0e61fe4f1bc12fc20d489982b7d3cf1d0c4d3fec9c7e457b3714417b92226013a78d8c4a33a2008db6105fa05ebc9627185be990a354140b9e54cec448bcc7f92e1ae6a63b7f4f895caf15705b030127f0b20523ac70831faee813cf5bdf3417a6e65e571ed197031d5f5894a94b125e52212a775c4f09a484ab13650e246b67c771712d8035c19a282feb588078dd246ee3c59116ef0beee7612c9e685ad8695a8836344fb5aae0526b50d722a7fcc2fea6c5fc317f92f4eec5f66414706b135a35a3dd716d014bb4fbceec4437039834af8d4ee9f95d60baba7b0ef3ee68f9abea1e41efb957914f05866a9651a59c2decad63c48dfc4ebf897b5941bd0e31786c1eee147ee1f8507895fc7c2f5760710cb783d8b421f38a4843fad9b15f1a2f9033a9de86ad5d4855725ff53c70662ebd173831bad57fc41cb0ad7e4899197a480c0743208e1903860b86e1983bc41289a01ef5d7963511ae6065ab3618ad53316177a4f034ef64e4c0663cec3d506d0266b7f6ed9d57d2ef552be600dfc626ec3f8e454a1347a5c8dcc737fb21f714ab1266e280952045ba267f2923d7b824fe6d6a72254733db59045a0718be4a92e467c0b0b53e80f55a1dbb38053d60d9c27de56028d0e19cc39762e5c26140419b3540eeb356a42c6c4d361a420b96c39249ef9232a58e7bc9b939718788178fa1239e62d9f5eaa14fdac7130fa4b454f71a3a2addf53e560072bf561c2de7b16d5266e9ad3bf743893c69bdbef10f2821cda01c6cd1c3c440fd8d062e44ae58224cef0330aa3afef48995cbf7f67d419c78fe96714bfb037c3a554c560e8c87e530b3d590c02bb4fc847ba787a24a2610d9bbe0259aa47eab3117387a5325fa931efef5e96c6c04a65f53889d00e4def94d9a59f77a5368328fb4e77d28f7210f7ce3e25956b19b738d2483fef45011fa514de53209f1cf5a2b81832b4ac86a2a2219dbf644f51cee285f3a3b306531f03c869148b95ce04eefc7074b648f81033ad9346acc558db028a686502929b2b3c8b575b04d7ed318c4ceaef866797a892460de9e218df0a768229349f1e2a0c5d672530cba4756f226fd6f0fd1a35b19f34cb9bcd2e3034c658730c130881c544bc4d4ebf8f0f2117581a1c05626beb570b69a7acc8c7d3f4ef07c6f27f09877633ca85ac2f940845f20e77093236aeeff3c8c92c00b847fd57c125a8787f9a5d34531b68910a349f900abfee81357dd93b170011824ecc1a60ac9989582b52d3cfd85a346b5c27605548ff8042ea2f5327e542e763f7019df0efc8196a3402d17c00471735937a7fa6ebcbec307d9b21947257c671b9f30bfd7b79cd89efacca1c60a0fe6a9d9dc54654c778b9d6797a732742ea08b4c357ad5c8e6118a7cc1927f2448b1711e697760a1a8473ed4c41aaa350bd09239fa98eef286b08b78e7f3978626d1fde6f4026f3b529483c608858628928db0a174ae5f02ac70aa65d8fe53758a9e6ea69aaf4a499201722351953a772a8f255c404790c4ac5719b908a502e93f0947553778c0780486b691bb15c5169d4564491a4c732f8c25e71b84282a1981d0160bf63f2b99404139f54b0cbcf26daecc9ae0b3b7be9d0e1035247eb01e42c5dd64e94fad380e46eea4021d402d2fde45aa4b0cd14c867645cb1af4c8f0a0297abbaa6e2b640b0e1d8870e0ec51c49c2756bc22a1f65f09e917b26efa6cbf20e5c7d048f8510bc2d23118cb97b0777bea4f3930dc034c5c6997b5310029ee8209bedbea6252f0de329af8a574d97afa4ce5ab8efb5e96f85939261100dc3efca0ed647c1b193d4f1bb59b01cf8dcb1cedeb0f533cab6bb8c674038e16cfe1ef6dfe913bb5aa673cf1ae9fb233bd41e02b1ecf41369b73bbb325eb070aeac4a8633d210ff6882a26d1a2de6983a00bcdf9efbd5a0c0a6ae6277b672e69d2d0e59c566f17bb82012f81010ed1e1e7ec65d463707e70edc9c85e8e400fe0a7eb5ea1de1062547715c4cdc6a5da182beace431cb3dacb1d5ffedf65073ec59af0291eca096bf442dfa9e033cb57805bb0abaef991268186ec9207c35bb512a3dad540714fbccea0df7260c7ab64defc85e40da76dda1190e78d77006d15503af72c3d61558ec0d5077bfe5fca33862fa02ef2229de9e6e3e9931e60b1b9a9e64cd431f4df1a4bba229dd10c526d377c445a9cd1ad3b34b8f2db49e856620bde7374f5ca4075a0b437091f5d1b3602456f6c3ba37866039cbbf1b9b3401fd67c6fb3fe95962fe2dee2b1907740963c16bb57e25ed50f017d38b59fb89675efa97208b3edf22d955e9feead2f01ee56fc5f81861005ce1a68f2ac9559ff62466c855b0c6e12bbc702ee3bebb0237a860a3710bae226a02601cf2f7ed56ba8c4583432247b957452d0a3168f9b7bcd5463e0547238177c9b8068c7c4655bf570022cc6b6a539bcc0c1c8258752d018a88052a66f2024067b6caef0a884455c8320c26248f6f61a131fd7d6327a1dad437f183cd6896e26da464c4c461953922326591aea9d90c94ef2f2061c8f419e0a6e82742aee178010aac30cb5847b4dd9f69d2a216d19a58d3f7ac40c61b3ee12835a5ec32ffb1c78ec10a0a1d48f1c5ff1c7782a178ddab8f47aee8bb258b5f85176bc99aa24918e78d63ceab68940737b125b4447daf1293ecc546b3ab96502bac560f3c3412ed801166562b1bd17bd37eccc7f174cba7981a5e45a350b331f874c"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x1038, 0x4, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x4}]}, {0x1004, 0x6, "5d6700292723a9a9898a26b3c862b1c094dff3847f82787e90307bb64d5f5e876def067efcd0c237731db63b39b8e34833a93607e0f56368baf02d7f1170d4eed3d108137bc4124f3a84f9ca78455442e444c2e57aaae521ef1d23d361e959495edaaad18e472b3575ccf2c57a77032809af98c018bdbbf27f680f006b08164cff1fba9ac80174bea188994e3d6b029b4525a8b078c46f4bb016a7493d23c0bdb7d5af2df1830eaa1b1a153cc19cc544762fbb2a3339e1e3100a36c37de7bf5c2da3286ff77e505735735e979b54e2af8e3b4b46100b922639ec4d1aa16df44420a296f924ebf39a6007c75a68d12f99bcd7d91b140f6b001daa65fa92e51fe1fea6cf8db0b16a3bf2484543c8357ca962b8736f3ce2ebab98c475d7d643e9bcf7a59ad5aa1fa8794ebfaf5122f623b7bca0138114702393db89ad51b6070c4629871b6f1e5d90e3d181b593db07e1d61a9a88ad4d3884d3185f0c4c9a90eed5948bb4e309812552cfdfc5a719bd6c7a0cc023a1c8a95b4b0d4bfe6ce328ba83414686212e3f97023eccae2954fe2b3ca5190a572b914f66b0a8a4298fdc75711eba4f96c7f9d51a0ebccc2cc48afdb65be1f61c4696104e25e02677f0b0af489ed4f2ea2550b1cef3b0ac0b539a46b124a5ce3ffdd23745d223ff10f0504d33254bd4f56aa1990bfd75d704a3e1e06f577ce7ddd416143266b5720114ced3ea5f1ccb9d5c43e86d17830c16b7aaa356cecb25e7da6a2aece1d6a37a4ffb5504f513324f1f853826693b254c8e04a8346f92f375c7c748faa1ef920b911240f2dceac3f557b5efe04aa61ba41b9ba6328ea632fdbff15d2d94ba4a89c918e43f3d1ac4b0d1f6e20d5d3f13d5af4b5182b48710336582ffb6824b9613067745da6a123f1f728ae0ce69c3873825c671ed2d784d671791a752f36c4cc09928ecff0dad2d851b3de18aebaa721c6ee31e5ab5e1a0ca41ad1ac53731902d151ed45b9105b3856472cc861a17a5a1eef3d8b9f837940ba8e143313603b1171469e646d1de4097417190d9cd6c723c7cf2ec9359cefb4dbadaec4a21a5bf1427649e984506a9d860e3c02f4c7cf1339ed9134a191a46fed63e26f8784e478afd7707d0faf63b1d652ac25f5f406e3ecf31aae440405a425ab1ac7213b755c7b98348c8d7058c1761bb61a9016849fbdcc0abfcc9b605d704c2b60c8aafa0ae8a3b7da5d85d34e2ae2a2d4f75d9fe12be46c146f7b1890092bca27ad2d316e918980848274e5dbb530efb4d76329cb909292f017b7d935390951dbc5716153d3f320c9a7548e76cc5a87579d3a9ff27c87bff069a965b7bbda011fae9f8f60dad5cb8b2e669c4a94b66ffe9a5fcd9a9ea8299e01cb5a77b2ebfbdd9d2198489c9a8771aff7e59c34a40e382fde52c051540a58b60db366c2990d7408172950119f2630a4da964c24690f4fb06edd1849f241afa793c22f06f7131e51073f3e1e34e22b21e0c056c4f880c1aa924599a2443282b76c93538ef9c7094835f515f8f1d65d02f1536c4e3f4bca9e7eabbf9a89af3a044bee3602e75edc85e736a5dc9b0aa0a189454621aed2fcd9097c558582e924b70fe440f4dd9170e2619544d0d134bb6592900a985cbe30cb6f81fa5eec0cc77db1ac425829c089d3d083d2dcb4a1c0beb3e72ea097f75686273bb31d9e6649a41a846a65d22d509331d32c93facba3d215e462c719fae6f39fccda559fede6d3af69d292c4b1d82343c10df21305c03f35cd419060f8e279d5952a94f3a96a4924de67055f292d7ee49a5c62e013fb3398e6152aa0a1ac2eaf48e03e5374d19ebed73a56f60562c2c971ae7a27380ac002dc286623cf74cfdb514e1d5bc071be9b318ae4d93b9431d5a3b6d030a8af90ab76076aa7f753d00f59ccd527cb0be9e2a62f19fd03ede4ea7fee35d473238a6ee974343eea5394450a70937dcfac4255f932aa040e5a81bd722c3cf60fe8c42ac1ca93a1039774e9457237fb8f88cf7b36b5b5a313df6c40bbfd9283789a37d683225e0e445090686031aed7746e5c2f11577adc08c00180321466c578b3df8768bf5d18a724be3312ff11000f2b1eeab5fd8e9141a814250e6e63e614706bb98b2f138279993b4d1f519095032d78186af64ae23cbe63eb39692db5cd50ced79baab19ca6b6580ee716d412d08da4994091ef2bb0504bae1023c609eea3382af97be0c6f4afb28064005693c549c61a7a8f0462016c966823fde8a4dd60799427663ee3115b7284a6051ada996ead54023890781c0f7af95f7b5bfb686fe6703eda88293cb45cc202b9d087841ac75c8de07b475d4b5ad37328b57598e19d02bcbe3b3ad5b8fcc75714707f88c755677e50c46aaa4bcd6a0f4e740e48927a12e784f4f17db25e1800568741bd7ce6260c8609acdaca37d71e3ccca98825e7a17532f65dd8e1c98de5b7a74fea2fc3c3c85d9cee8999864377f3d055bb74cdbef54e5a4cc20d17962f5d4a70ad922207fbd358d40c5d69bf1ffc163255c1e15f471b9e3248c2d59f9e4707840f616b5342017ceeed49f83b2b7b01afc6b29398fc17abea12a3e0188875b3a3f0b242a1fd9c30a29f17f3838e56236c64047f836c0aeffd447b422b82c8e1921f2695580b3cb5680080401cd108f53ed5cd0783692ce942244aaeb3e99dcec0ccf72ecdaa85d09d8bff8dce707ce11882441d9374f4143abc1d26bc21907475f7478cce8d919776cf078e907e3755291f2962db7ee8f8bbce7a5b1726d4663f1a22852031f18208df629cde06362b0a6547dbcf9a40c4f4007f1f3247a1aa9c55ca7be0e41f4704a85a9f4baa12adb738be4a958e6bfe9085fe82dbc5bfef6fde7af00474baf17e2c3e4dd393c1e0c30ae578a53a59e19d24acb5c9e0bed38aa0b1f0f2b6b1f797024a4307b4051c7047def8d4029f1a2403ab7d1b3a3c7b10dae59d59968aa8fd9226d8fe76ec5bd8145c7bddc1111eba3bda5502e52eeb2689ec1cea89b6fd2cbba8567b94b08eaee2de0e20f2bcc96c1e689f3723b52bd5bc8a665825585899926ff8bed7af97bd74051228499b5cc54d4e8fe1ded710b652586e98228956159752755aaa0a4551e670eba424cc74b8c2418c34a59911fe87cc7d75040f6114cb3963ba8282dfceaef0a2b3faca1abebd2c249f87d6cdaf152c9469a00588124f5b52825afd27438de2dd28af2f4a2ccd9511f6502a82367e9e25c8e642c698ec4358821a39ce27f2489dd79979ac6f308a464e2a2b03ae3fe10b853b43f6cc676c73d406bd685bb098636635bd0fd078cbd828bf5b54f6a01b92b1219f8d93bd89eef50f1a82368598949297f0d76afaa9ccf84bc15cf96a466477b119e52b179589750efb6130e86b3b53f627f945ff8137f4c2ac448e105e2140327fabb6a616a3caa22554e2885013526fd1426b4d828871349b43887fb6a71fc47a3dfbdd30c21e47f23384bad1ebdaa31286aa90e98e08138b9c54888bc8f6d0ea248549125e6d4d9ac7e7cb9f5fe6a1fd51955f69fd5d5851539cb5cdce5d49cb6796be4afaa51c78ff5ff332c0196db440442f76077422df732e8b1ab16aca369619245c35902db543a15fd16994b1ef0e9503476a8f667068d85a8768dfd91b728bd1cd584c84452568e61ba0a5c5f047f74b769ebb85a159ce262c7947857cb1b82b1807823b6d029db4faa1212d203003924065b4b4fe7a60b185ad194d896ef3a9487d50ba3c9457eee2fb9ec192b719d7dd6f7a23d28611f2e96df215fdbefb803298ec09ef1c8c6d092233df4c93af522331de072d462fc825a9a9ed08ced4821670ff5d806367e4eb846830e33479c62243a74d2318bd60c7bc7591904f3242e76512b8a23a8f3286bcbbb3aa4642fdd84982226960746221e7753efa86f4054828d4fcf01ec791d7f607e8a690a4e54e3cc97c3d2f51b861cae292c3d9e796a4c0b17e6831699f76bee6273eff686ab080eb294fa3db6ddd567da422f3c9ce76f1ed02364f07d90d3b6399e3da3fb7f66ce02341f44a958a8550bb5e0297529e08f9b8bce4e7b103551876df998f5d4d1e67accda3712bdab39763f3b91c46eac27fee73267ca94f5d3682f9f89f8def86a77bcddac448fa6836e2b85f2e764ba166379c2e36aa564f93af25ce37c7586b58475ed5bca80fca53d35ce05129412840e89963dbc86cb8419ab473b98e4f0eccc0ba79ddbe49633582160e4c0f5f9742a2be640128ac1bb29d8ad63ec38aec27cefd205add53c6ef2b5f50fc5991a2fbb7875bf8d4858457467165c4768dc95d7040888e7e48f7ba8226926de5a76c74bbafb1da23944c6e05296e6ac124ace43d1accb9e5586d9fc04bc4388ab92dce85f1277f6abdb3f86af5b84333cbd45a4e55d2f4d5975a853ef18a887aa29b79692291f77d5593e304fb92320d5a023bd92bdb7ff2626e1f5f0ce8cddb92ed4c2ce06f0352856f75767288cc63a16a28f0575b70f4122f3641f575ca6cd63c1afca126b0eff9903e273abfaaa515072717815a546323adc51060edf95fceda96c559ec9aa75920e774036072918ef5dd3f62fa2551657605cb09b81cf20bafc8f9550268b0a9d824d8393fd6297ed9cb1528c056ea869e31a05c8666715c66e606db899d540f97963bcefea31f9b7faa28fdb7241e8e3f61500555f7dae78d26ddd3a86d7a02a1289db6906890295eb9a7d46d12a1e019de0e445ba142264755867799ff309214113a068eb210d44b4027f66599915232f2e2e1e9bd9b6c90c14a5d1d74dccb9f432bcfa66fd6b76c17a688744a69484836a6ded338d6ce1b80940a856af6b148955e4e75438e5c7e168bd0bbccd0a90303a86a3c4743659e7c5f3f6f348e3f85b91a1c352dc0c9c66f5cf0ebcc4b754a5b8c39c21238ae0ebfd40c690b57b83c1494a9e03b467e36876468db18656ae094db2d2fb76d540ee45055dfa364beac090fc3a9360c88a32b96c4295b5318e0caed3767a621cad50167436f7abd3a1a3d577e944dcedcb4be44ec98219d2e536af31c1017e447dc68338cc97f80d6cfca25c3ced436e9b44dd157b166a6dd48334eac02afb8377bf1781be585becd92b768e4731f2c3e5e0642b6c27752f7714f609b02e853b3cff2d783ef4a2f15a9897458b6603b64ba0101d2db9bbdc4861179ce3d8c17433c27b7686297eea5b64d500549946d73b2489b50b46ac3544108e11286f00cac1af407b340268a94a16e0950bd601317bfecc2323434dbd8b4c4baa4a4bfd06c432f81fee86911ef585f472e7bcf6c3ad9d7dbbf7c6b7dc5d78b218d77bbde23ba5367c36c3dadc4e0670763f98368d78cff3babd6c3c583e4ee0e758e161c48939fcccd851944f34707f5acd20cbb38e1ec92c197c29e5aff2a9e3567f41ca9637a0831774f7ace15d76e639ea1a6ea150bcb2da21ae506ec9ad3dde0c0efe6b2ada2e3c062108ef2207c7e822c2e9202912a4872c00c5cff4303ef5ae47b931454d1cc442676ea9dad0e5f3e2273d35df8f08ea7fdd85e86f98eca409157b88b97e4ba30559e6efd23d81a26ddb565fcd40c247b0487f873c481bbb68bcaa4d938c0355ff4fce7758b1f7fd497c457fc42ea7d5cd178bd97945ff31e58cca3d90a39dfa701006b2bd08451148b674c73f9b8063941b15a160f3e1a57529d87cb7de2611a731cb65b25d996d0f6085c4a362423904ce6a0d888d133bb3ce8f743ec3e9ad055034b4d0f0a33a35edfe2a7f090b889d08e9f4ed341b7bf1aaac9e8c5f90bdcef8ada7"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x7}}}}, @m_simple={0x174, 0x7, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x84, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x9721, 0x1f, 0x8, 0x1ff, 0x3}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x1, 0x6, 0x8, 0x1000}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1f, 0x401, 0x20000000, 0x8001, 0x7}}, @TCA_DEF_PARMS={0x18, 0x2, {0x2, 0x81, 0x10000000, 0x453}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1ff, 0xb0, 0x4, 0x0, 0x1}}]}, {0xc6, 0x6, "db81007b3aee373bb230239ef79219bbfe6fe95f1bd872b458491c47575674ab5526591115c2a4ed21ca6989b4f10e7a1aac25a54fe1173e382a50a11287e96aabe7f1e51ec832025ed22ef0706e58426d2094f8c39d0cfecd8f0263b7c5c418af951289c299c59c3249a699ac8b968af5aa1b3f467c02e0c7f5c06bf27d4e33fb132fc8abe1e8e6e3db9a930c008316625070eaa6216e87117b281bd62a1b696c15db3cc03e94685de7d8cf833b9238d8a2b35355444dc1ba98d4b527ec79fca8e1"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_xt={0xe0, 0xd, 0x0, 0x0, {{0x7, 0x1, 'xt\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0x2}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_INDEX={0x8, 0x3, 0x8001}]}, {0x9d, 0x6, "8a458c82a4ac03f2cca3028cad2f5c5e62cb0590014a3110284359fe8740100783f37e252329b2c52dabc2b8bf7988a33939e003afa6b276ed3a4f17d71e1f7cd7942054b6302ddedb39790d7642375a54b073b447b99d5aee932086be71bfa8d25970cd7feacf3fc7d4cd4a573d4025bb6420f73c5d3dae4ada1804ebe744f9d91799eab680180872b757fe38322b0146ed2cf160dec14819"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_tunnel_key={0xd4, 0x6, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3f}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @mcast2}]}, {0x88, 0x6, "6fc230f01045543ff80723d1496b24cd51f74f965485194f717287023411a4976a3df376635f3f8ee246a8ee4de50b24a8d4c0aa46f1dd6547367e12b017dbfd1d04cc09fcecff455eb7e4c4f06466d7f977c1d2241ce9f934f3d8d4674adab29f1ff71282588f6961507cd3cb92c874b120ba7088e569a002baa145e99531139718b9e7"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_mpls={0x74, 0x17, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PROTO={0x6}, @TCA_MPLS_TC={0x5, 0x6, 0x7}, @TCA_MPLS_LABEL={0x8, 0x5, 0x6bd42}, @TCA_MPLS_BOS={0x5}]}, {0xe, 0x6, "dd29e9403f9175333ac0"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_police={0x1998, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x18f0, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0xfffffffc, 0x7, 0x200, 0xffffa878, 0xb4d, 0x2, 0xfbc, 0xc25a, 0x9b, 0x346, 0x0, 0x5, 0x20, 0x81, 0xff, 0x8ecd, 0x0, 0x8, 0x8, 0x5, 0x401, 0x3, 0x80, 0xfffffffc, 0x8001, 0x8, 0x1, 0xff, 0x400, 0x0, 0x7, 0x3ff, 0x4, 0x25, 0x5fc, 0x20, 0x7, 0x5b4, 0x9c98, 0x101, 0xfffffe00, 0x6, 0x7fffffff, 0x0, 0x1, 0x5, 0xcb, 0x3, 0xfff, 0x3ff, 0x7bf, 0x80, 0x5, 0x3, 0x7, 0x0, 0x80000000, 0x4, 0x631, 0x8, 0x7, 0x8, 0x94a, 0x1, 0x1, 0xfffffff8, 0xffffff7f, 0x9, 0x4, 0x3, 0x401, 0x1ff, 0x2, 0x3ff, 0x1, 0x0, 0xa, 0x1ff, 0x1, 0x7, 0x6, 0x4, 0xfffffff7, 0xa03, 0x9, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x2, 0x6, 0x4, 0x2227eb4e, 0x401, 0xff, 0x3, 0x63d, 0x3, 0x2, 0x1, 0x1, 0xff, 0xffffc392, 0x4, 0x7, 0x2, 0x0, 0x7, 0xfff, 0x7, 0x7, 0x0, 0x8, 0x6, 0x8, 0x5, 0x10000, 0x9, 0x6, 0xfffffffa, 0x648, 0x80, 0xfe000, 0xf9ab, 0x4b, 0x5, 0x54, 0x9, 0x3, 0x1f, 0xfffffff8, 0x20, 0x2, 0x7, 0x80000000, 0xd, 0xa091, 0x5, 0xffff, 0x1f, 0x55, 0x0, 0x0, 0x4fb9, 0x40, 0x81, 0x0, 0x500e, 0xff, 0x0, 0x6, 0x800, 0x0, 0x3, 0x3ff, 0x3ff, 0x7fffffff, 0xff, 0xfffffff9, 0x6, 0x2, 0x0, 0x1, 0x8, 0x8, 0x1000, 0x6, 0x7, 0x7ff, 0x8a4d, 0x1, 0x1, 0x5, 0x9, 0x2c0d433b, 0x5, 0x1000, 0x8, 0x8, 0x0, 0xffff0ea2, 0x80000001, 0x4d, 0x80000001, 0xe3, 0x4, 0x5, 0x9, 0xc3, 0x6, 0x5, 0x1, 0x8000, 0x800, 0x7ff, 0x400, 0x1, 0x2, 0x7, 0x3, 0x1, 0x10000, 0x6, 0xfffffffb, 0x1000, 0x5, 0x1, 0x3, 0x400, 0x3db, 0x3, 0x3f, 0x9, 0x5, 0x4, 0x3f, 0x1, 0x80000001, 0x1ff, 0x7, 0x7, 0x6c7, 0xfff, 0x6c, 0x3, 0x5, 0x6, 0x4, 0x5, 0x0, 0x40, 0x4, 0x81, 0xffffffc1, 0x5, 0x7, 0xfff, 0x3, 0xfffffffb, 0x5, 0x1f, 0xfffffffc, 0x3, 0x45, 0x3, 0x7da, 0x2, 0x809, 0x0, 0xfffffe00, 0x3, 0x3, 0x2, 0x6, 0x4]}, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0x66, 0x356, 0x80, 0x6, 0x575, 0x1, 0x0, 0x8001, 0x6, 0x8532, 0x1f, 0x1, 0x2, 0x6, 0x3, 0xbf, 0x7fff, 0x80000001, 0x200, 0x1, 0x101, 0x9, 0x8, 0x9b68, 0x5, 0x1, 0x9, 0x1, 0x3, 0x6, 0x41ac, 0x6, 0x1000, 0x7fff, 0x4, 0x5, 0x2, 0x6, 0x3, 0x8, 0x6, 0x3, 0xcdf50e1, 0x5, 0x10000, 0x6, 0xfff, 0x2, 0x80, 0x3, 0x4, 0x8, 0x8, 0x5, 0x9, 0x3f, 0x7, 0x8, 0x7f, 0xa5b6, 0xa18b, 0x0, 0x9, 0xcee, 0x1, 0x9, 0xfffffe01, 0xfffffff8, 0x7, 0x6, 0x2, 0x80000000, 0x1, 0x1, 0x6d, 0x8, 0x10001, 0x800, 0x200, 0x5abe, 0x800, 0x1, 0x10001, 0x400, 0xff, 0x9d000000, 0x0, 0xc33, 0x100, 0x1f, 0x0, 0x2, 0x0, 0x1e2780, 0x4, 0x8, 0x2000000, 0x7f, 0x7, 0x3, 0xfffffff9, 0x9, 0x7, 0xc, 0x321ed2fc, 0x4, 0x8001, 0x1b5b, 0x1ff, 0x7, 0xab17, 0x200, 0x1, 0x7, 0x6, 0x0, 0x2, 0xb01, 0x80000000, 0x1, 0x9d3, 0xfffff801, 0xb39b, 0xfffffffa, 0x9, 0x10000, 0x5, 0xffff, 0x9, 0x10001, 0x0, 0xdf, 0xf3, 0x1000, 0x3, 0xcfe, 0xfffffff9, 0x8, 0x9f, 0x8, 0x5, 0x6, 0xfd, 0xb84, 0x8, 0x888, 0x9, 0x5, 0x5, 0x5, 0x3, 0x8, 0x3, 0x1eb, 0x9, 0xbb5, 0x8000, 0x9, 0x2, 0xffffffff, 0x3, 0x5, 0x25e0, 0x200, 0x20, 0x0, 0xa0, 0x8e2, 0x7fffffff, 0x93, 0x2, 0x10000, 0xffffff05, 0x5, 0x7, 0xfffffffc, 0x10001, 0x9, 0x6, 0x80, 0x0, 0x9, 0x6, 0x7, 0xffff, 0x5, 0x1, 0x3ff, 0xa1b, 0x7cc6, 0x8, 0x6, 0x3, 0x4, 0x6, 0x830, 0xffffffff, 0x10001, 0x100, 0x4, 0x4, 0x1, 0x61a, 0x8001, 0xffff, 0x2, 0x1, 0x4d40, 0x21e8, 0x200, 0x447147e, 0x6, 0x3, 0x95, 0x6, 0x1, 0x2, 0x80000000, 0x101, 0x9, 0x4, 0x1, 0x0, 0x2, 0x7, 0x3, 0x400, 0x4, 0x2, 0x68af, 0x6, 0x0, 0xffffffff, 0xfffffff7, 0x4, 0x8000, 0x0, 0x7, 0x9, 0x5, 0x0, 0x8, 0x20cb, 0x1, 0x9, 0x9, 0x5, 0x8, 0x2, 0x3, 0x81ed8592, 0x9584, 0x10000, 0x8, 0x5]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x8, 0x0, 0xfffffffe, 0xffff, 0x10001, 0x6, 0x7, 0x2, 0x8, 0x0, 0xfff, 0x8, 0x2, 0x7, 0xd1, 0xff, 0x9, 0x180000, 0x5, 0x10001, 0x100, 0x6, 0xaea, 0x325, 0x100, 0xfffffff7, 0x6, 0xfffffffa, 0x8000, 0x628b5a05, 0xffffffff, 0xff, 0x3, 0x8000, 0x4, 0xffffff01, 0x7, 0x800, 0x8001, 0x9126, 0x2, 0x4, 0x1ff, 0x6, 0x1d4, 0x10000, 0x4eb9, 0xffff, 0x4, 0xee, 0x7, 0x7f, 0x8, 0x1, 0x6, 0xff, 0x800, 0x90, 0x2f, 0x100, 0x1, 0x803, 0x3, 0xffff, 0x5, 0x1ff, 0x9, 0xffffffff, 0xc5, 0xfc, 0x800, 0x3, 0x62b3d907, 0x5, 0x1, 0x4, 0xffffffff, 0xfffffff8, 0x9, 0x3, 0x8, 0x8001, 0xc73, 0x8, 0x3, 0x8, 0x10001, 0x9, 0x9, 0x200, 0x3, 0x8, 0x1, 0x548, 0x400, 0x6, 0x4, 0x9, 0x4, 0x1f, 0xfffff801, 0x7fffffff, 0x37d0, 0xffff8000, 0x5, 0x1, 0x3, 0x9, 0x8, 0x8001, 0xc14, 0x2a3, 0x5, 0x6, 0x3, 0x8, 0x2, 0x3f, 0x5b05, 0x3, 0x2, 0xfffffffb, 0x4, 0x4a9, 0x8, 0x4, 0x6, 0x1, 0x907, 0x9, 0x1000, 0x4, 0xfffffffd, 0x988, 0xaa, 0x5, 0x7, 0x1, 0x0, 0x101, 0xbff, 0xff, 0x3, 0x100, 0x80000000, 0x4, 0x7fffffff, 0x4, 0x20, 0xfffffffe, 0x0, 0x0, 0x1, 0x4, 0xffff, 0x7, 0x9, 0xfffffffe, 0x4, 0xff, 0x1, 0x7, 0x3, 0x525f, 0xff, 0xffff, 0x40, 0x1ff, 0x400, 0x1, 0x23, 0x100, 0x8, 0x80, 0x401, 0x5, 0x8, 0x0, 0x0, 0x0, 0x1f50, 0x0, 0x7fffffff, 0x0, 0xfffffffb, 0x3ff, 0x8, 0xffffffff, 0x5, 0x2, 0x6, 0x473, 0xc93a, 0x8001, 0x8, 0x4, 0x8f3f, 0xfffffffc, 0x4, 0x4, 0x3845, 0x1, 0x8, 0x20, 0x9, 0x6, 0x6, 0x8, 0x5, 0x265, 0x8, 0xdb, 0x5, 0x1, 0x5f2, 0x5, 0x8, 0x4, 0x9, 0x10000, 0xffffffff, 0x101, 0x10000, 0x3, 0x31, 0x1f, 0x0, 0x1f, 0x24, 0x8000000, 0x90, 0x4e81, 0x0, 0x10, 0x0, 0x8fd, 0x0, 0x3, 0x2, 0x1, 0x1, 0xfffffffb, 0x6, 0x586, 0x4, 0x80000001, 0x6, 0x4, 0x1, 0x10001, 0x0, 0x1, 0xc1, 0x400, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x2, 0x380, 0xd275, 0x3, {0x9, 0x0, 0x61f, 0xbb, 0x40}, {0xdb, 0x1, 0x5, 0x2, 0x9, 0xd5bb}, 0x4, 0x7, 0x1}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_RATE64={0xc, 0x8, 0x69a}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x2, 0x5, 0x4, 0x3, 0x1, 0x1e, 0x1f, 0xe4, 0x80000000, 0x2, 0x3, 0x3f, 0xfb2, 0x6, 0x4, 0x10001, 0x8, 0x1ff, 0x3, 0x8001, 0x8000, 0x9, 0x3ff, 0xebff, 0x8, 0x0, 0xff25, 0xb708724d, 0xfffffc00, 0x4, 0x1f, 0x4, 0x1, 0x3, 0x8, 0x3, 0x3, 0x3, 0x101, 0x2, 0x8ba, 0x2, 0xffff, 0x7d0, 0x8, 0x9, 0x1, 0xcb, 0x312d, 0xfffffff7, 0x100, 0x7fff, 0xa2ea, 0x1c, 0xaf, 0x8, 0x2, 0xffffffff, 0x549, 0x8, 0x0, 0xb254, 0xe95, 0x8, 0xffffffff, 0x3f, 0x0, 0x9, 0x9, 0x2, 0x1ff, 0x2b74, 0x2, 0x6, 0x7, 0x80000000, 0x400, 0x4, 0x8, 0x8001, 0xffff, 0x3, 0x63, 0x7ff, 0x2, 0x3, 0x0, 0x8, 0x0, 0x100, 0x1f, 0x20, 0x172d, 0x84, 0x80, 0x0, 0x2ed7, 0x200, 0x80000000, 0x8, 0x9, 0x2, 0x3668, 0x20, 0x8001, 0x7, 0x4, 0x8, 0x1, 0x2, 0x7, 0x4, 0xbcd, 0x3, 0x400000, 0x2, 0x8, 0x2d3, 0x4, 0x18000, 0x3, 0x3, 0x3ff, 0x3, 0x4, 0x1, 0x40000000, 0x7, 0xdb, 0x9b21, 0x200, 0x9, 0x5, 0x8, 0xffff, 0x2, 0x1, 0x7, 0x800, 0x8, 0x956, 0x1, 0xe12, 0x6, 0x40b2, 0x7fffffff, 0x10001, 0x2, 0x1, 0x4, 0x9, 0x7, 0x8220, 0x6, 0x1, 0x3f, 0xf42a, 0x10001, 0x76b03dce, 0xfffff801, 0x8000, 0x7, 0x0, 0x20, 0xffffffff, 0x3, 0x1d9, 0x8000, 0x6, 0x8364, 0x1a, 0x100, 0x100, 0x2e61, 0xbe2, 0x40, 0x27, 0x2, 0x7, 0x8, 0x81, 0x8000, 0x80000001, 0x0, 0x7, 0x101, 0x2, 0x7, 0x1, 0x4, 0x7, 0xed, 0x40, 0x401, 0x24, 0x8, 0x8, 0x7fffffff, 0x1, 0xa3f3, 0xfff, 0xffd, 0x800, 0x401, 0x0, 0x1000, 0x2, 0x5, 0x49b, 0xaf, 0x6, 0x4, 0x5, 0x1, 0x8, 0x0, 0xfff, 0x8, 0x1674693c, 0xffff15e6, 0xffffffff, 0x2, 0x1, 0x8, 0x8, 0x9, 0x401, 0x1000, 0x0, 0x3, 0x81, 0x0, 0x101, 0x6, 0x80, 0x2, 0x1ff, 0x1, 0xd1c, 0x80000000, 0x4, 0x5, 0x7ff, 0x9, 0x6, 0x7, 0x97, 0x800, 0x2, 0x8, 0x8001, 0x5, 0x200, 0x2, 0x7fff]}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffffa, 0x0, 0x1, 0x6, 0x4cb6, 0x5, 0x7d4, 0x7, 0x0, 0xfffffffa, 0x100, 0x7f, 0x0, 0x40000000, 0x0, 0x9, 0x9, 0x9, 0x8000, 0xffff, 0x80000001, 0x80000001, 0x66, 0x3ff, 0x7, 0x7, 0x7f, 0x1000, 0xfffffffb, 0x9, 0x6, 0x10000, 0x5, 0xffffff73, 0x7, 0x4, 0x0, 0x4, 0x46a, 0x3, 0x7fffffff, 0x4, 0x9d6, 0x80000001, 0x3ff, 0x0, 0x400, 0x81, 0x401, 0x6, 0x8, 0x0, 0x6, 0x1, 0x1, 0x20, 0x3, 0x3bc, 0x734, 0x3, 0x7, 0x400, 0x80, 0x101, 0x8, 0x400, 0x80, 0x7, 0x4, 0x1ff, 0x1, 0x4, 0xd3, 0x9, 0x1, 0x7fffffff, 0xc6, 0x2, 0x0, 0x6, 0xffffffc1, 0xffff, 0x1800000, 0x3, 0x8d7c, 0x80000001, 0x80000001, 0x80, 0x100, 0x3, 0x5, 0x1000, 0x0, 0x0, 0x7, 0x7, 0x0, 0x3, 0xfd, 0xffffff7f, 0x3, 0x80000001, 0xf5c, 0x1, 0x9, 0x9, 0x4, 0x2, 0x1f, 0x7ff, 0xfb, 0x3f, 0x1000, 0xb, 0x6b, 0x5, 0x1f, 0x9, 0x8, 0x8000, 0x20, 0x2d, 0x7, 0x5, 0x1, 0x8dab, 0xfffffffd, 0x900, 0xe3ec, 0x80, 0x6, 0x9, 0x3, 0x101, 0x2, 0x40, 0xabbb, 0xfffff6a1, 0x4f, 0x7, 0x7fffffff, 0x51c8, 0xffff, 0xfffffff8, 0x9, 0x10000, 0x5328, 0xffff0001, 0x200, 0x2, 0x7, 0x8, 0x1, 0x8001, 0x2, 0x3, 0x1, 0x1, 0x9, 0xffffffff, 0x3, 0xd62, 0x0, 0x2, 0x67da, 0xd79, 0x8, 0x3, 0x2, 0x7, 0xdce, 0x3067, 0x80000000, 0x6, 0x7, 0x6, 0x5, 0x53, 0x400, 0x3, 0x8, 0x6, 0x4, 0x0, 0x3, 0x2, 0x1, 0x9, 0x7, 0x1, 0x9, 0x4, 0xdb, 0x4, 0x1, 0x8, 0x80, 0xfffffff8, 0x0, 0x9, 0x4, 0x5, 0x7fff, 0x20, 0x0, 0x3, 0x3a9, 0x8, 0xe74, 0x1, 0x3, 0x8, 0x0, 0x6d, 0x8, 0x9, 0x4, 0x0, 0x0, 0x80, 0x5, 0xffffff80, 0x0, 0x35bb, 0xffffff01, 0x2, 0x7424, 0x9, 0x200, 0x67e0, 0x4000, 0x5, 0x3, 0x5, 0x4, 0x80010, 0x541ea444, 0x10001, 0x0, 0x1, 0x6, 0xffffff7f, 0x4e, 0xfff, 0x9, 0x80000001, 0x9af, 0x7fff, 0x80, 0x1ff1, 0x3, 0x2, 0x2, 0x1, 0x1000, 0x1]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0xffffffffffffffff, 0x7, 0x112a, 0x2, {0x1f, 0x0, 0x4, 0x100, 0x0, 0x40}, {0x6, 0x0, 0xfc00, 0x200, 0x8, 0xa1}, 0x0, 0x9, 0x1}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x3c, 0x1000, 0x2, 0x7, 0xfffff674, 0x1, 0x9, 0x400, 0x7f, 0x5, 0x74b, 0xfffffff7, 0xb5, 0xd5e, 0xffffffc0, 0xd5, 0x80000000, 0x19, 0x3ff, 0x1dd5, 0x9, 0x8a, 0x88a4, 0x0, 0x6, 0x10000, 0x40000000, 0x4, 0x6, 0x9, 0x9, 0x10001, 0x0, 0x0, 0x2, 0x3, 0x6, 0x2, 0x1f, 0x9, 0x80, 0x1, 0x7, 0x0, 0x7, 0x8001, 0x6, 0x2, 0x0, 0x8, 0x1, 0x23dc, 0x80, 0x80000001, 0x1, 0x80000001, 0x0, 0x9, 0x400, 0x0, 0xff, 0xff800000, 0x7ff, 0x9, 0x200, 0x3, 0x10000, 0x1ff, 0x7, 0x1, 0x5aa, 0x3ff, 0x7ff, 0xbc2, 0x0, 0x5, 0x3, 0x3, 0x80000001, 0x7, 0x3, 0x0, 0xfd, 0x6, 0x1, 0x80000000, 0x7fff, 0x1000, 0xf9a9, 0x5, 0xfffffffb, 0x2, 0x9, 0x4, 0x6, 0x3, 0x4, 0x9, 0x0, 0x6, 0x4, 0x3, 0x63c, 0x100, 0x0, 0x4, 0x400, 0x4, 0x6, 0x5, 0xfffffeff, 0x0, 0x34d, 0x10000, 0x1, 0x80000001, 0x400, 0x8, 0x6, 0x4, 0x4, 0x1, 0x3ff, 0x7fff, 0x5, 0x81, 0x20, 0x3, 0x7fffffff, 0x10000, 0xffe00000, 0x8, 0x3, 0x6, 0x81, 0x2, 0x1, 0x4, 0x800, 0x9, 0xc2, 0x7fff, 0x0, 0x9, 0xa63, 0x1, 0x53, 0x80, 0x800, 0x81, 0x0, 0x7, 0x5, 0x81, 0x1f, 0x80000001, 0x81, 0x2, 0x1000, 0x10000, 0x6, 0x401, 0x8000, 0x9, 0x1, 0x81, 0xa2, 0x3, 0x8, 0xff, 0x0, 0x1, 0x40, 0x0, 0x5, 0x5, 0x80000000, 0x8000, 0x8001, 0x8, 0x4, 0x1, 0x7ff, 0x8, 0xb984, 0xe2, 0x0, 0x100, 0x97e6, 0xfffffe00, 0xffffff7f, 0x6, 0x1000, 0x0, 0x5, 0x6fe5, 0x5, 0x1, 0x5, 0x56, 0x0, 0x7f, 0x2, 0xffff, 0x0, 0x2, 0x400, 0x9, 0x1, 0x200, 0x5, 0x7, 0x6, 0x3, 0x258, 0x7f, 0x40, 0x451d, 0x1f, 0x5cd, 0x2c7, 0xa81, 0x2, 0x1, 0xb19, 0x2, 0x3, 0x0, 0x5, 0x2, 0x7, 0x3, 0xfffffffb, 0x10001, 0x9, 0x6, 0x8ea, 0x3ff, 0x62f, 0xfffffff7, 0x8, 0x4, 0x10000, 0x5, 0x4, 0x200, 0x2, 0x8, 0x1, 0x8, 0x401, 0x1, 0x7, 0x5b, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x10000000, 0x8, 0x6, 0xe4, {0x81, 0x2, 0x5, 0x6, 0x2b, 0x200}, {0x6, 0x0, 0x5, 0x7, 0x5, 0x5}, 0x3, 0x2, 0x3}}]]}, {0x7e, 0x6, "ffc7c8e1c2b0f375ad111a929af783e36b347fcfb7746e59de6351479b76f5860f16915d42d5f37a1e513af8e7abb6641dc9a743991403cd46489d3de2791bcbda15544728badcf08af6e2240324ed78d34cbd7aee280bb4e3a1ddc9c1e66c5d13f281824d7053d2c1bb0ee11e5f94ad7645341c544d1e642ef5"}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}]}, {0x14dc, 0x1, [@m_csum={0x168, 0x5, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x74, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x3f, 0x9, 0xffffffffffffffff, 0x2c4, 0x868f}, 0x65}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1, 0x80000001, 0x3, 0xc0000000}, 0x6c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xfffffff7, 0x1ff, 0xffffffffffffffff, 0xe6, 0x100}, 0x1}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x400, 0x7fff, 0x3, 0x9a}, 0x19}}]}, {0xcb, 0x6, "bf84fe587e4471d521290178879646aa6e8341e419c988b0735e56c4beba9dac5d9e9971ea208884f7a2753c6742c8bc10aa3dc98f16683042ab3d69168018c15a595ca069c8433cc897d4603fca737435ce4cabfba4d7578d02395e144cc0a228dd6f8452c1cf278787ba2cc57306f8fd45a36a0174f4266d5caf8c36051e67d2979b3735aef949e0bf551dcac39f0b3af1fc0e30707b7c7c85bff8ad4052d492431b6b3de5983239a534847b5c4bbd63483c08e3cefa8b0fe9a98451bfe71c3c2683fdddd68c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_simple={0x50, 0x1c, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x8, 0x3, '-\xef$\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4, 0x1f, 0x10000000, 0x400, 0xfffffffa}}]}, {0x4}, {0xc, 0x7, {0x0, 0xbc26bca8a7b4753d}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ipt={0x1320, 0x5, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x11fc, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x102a, 0x6, {0x100, 'security\x00', 0x0, 0x5, "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"}}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}, @TCA_IPT_INDEX={0x8, 0x3, 0x80}, @TCA_IPT_INDEX={0x8, 0x3, 0xfffff2d5}, @TCA_IPT_TARG={0xeb, 0x6, {0x1, 'mangle\x00', 0x3f, 0x2, "b7649fb23118aeb9b39162ed9562b5dd8cfb40967732d2a61e26cc27d87155456088d45029abcb4b06f7529895617bdee48337610c443016a271579d58145396627c3191e610d9aaddb32b5e6577dc70a139e878ad543223337fb411d4c4886473281436536424d7a0120447a35defffd475225c211a14a8f12794ed514cd818919219a606c28f3c165811fb9a1903d73e823ca1202bb66fb5379f6d9679e52dc60b7901be4d6dce9b813f416c5d48019bf3484c5f497cfda4e269f1e4673ad22c"}}, @TCA_IPT_TARG={0xb7, 0x6, {0xffff, 'security\x00', 0x7, 0x20, "48ec8f093d19f964e2c41b8eeac2d074b304493982f8846aee6b35a0a2a1471dc6b299a3330f86420c8e67ff24fe9950d93474d7e0355097a70e7345ba9b716d4abb49e4f9fca41d8e36d854a154a2254967431c633bcaecf5dc7bea235cfac960d99dddd119ebc1016c14f65c57f373e16d28f2286f0e167a0bff19079d3a07cba6223b8ea72e2f2fc67648c5"}}, @TCA_IPT_INDEX={0x8}]}, {0xff, 0x6, "304d4ecb9ebf26986443897e05cb1f859e1a3f5519aca69de7aa2279c521de839480b1704ab145f204fa3bb07600821f03b694ec32de68da14ce87da707d962f3d75e245ec0ca718e4a4af2c51224d4e47943458754112b1da09676c2d4d221d82fc933a29760c04baa13e0aacd5c0c48332fcef2b10fc3f932ac77a51d3c26d3768b05e9d7f1f049914c03186dec35a161ceffa2b2ed43e25532b0e0b08e2f97a8eb3d6fd0946749620d78458ba030013896c7e22cfbc56d2254e2a2012e05f54d7fe525857026a89eb38a95896167765379eb274d631141e50010a240ee139f2a24490489f8730c57b19bd3132b657ee992d93b79d4485ba2a6f"}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}, 0xc850}, 0x1, 0x0, 0x0, 0x2000c814}, 0x8840) 17:11:03 executing program 2: ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:03 executing program 0: gettid() bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5339b27cea5dfd3e}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x302, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x50) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x940ca7ee06da0187}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r0, 0x200, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0xb34428b3ed7bc3d2) 17:11:03 executing program 4: socket$nl_audit(0x10, 0x3, 0x9) socket$l2tp6(0xa, 0x2, 0x73) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) socket(0x1d, 0x0, 0x9) write$sysctl(r0, &(0x7f0000000140)='1\x00', 0x2) 17:11:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e20, 0x3, @local, 0xffff}}}, 0x38) [ 608.658727] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 608.664568] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 17:11:03 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000100)={0x0, "c4052ebf5884de36de15b6802b176360aba295a645c69758a08853b3211dd600000000000000018fb426016fe14564db14f22e7328ab934323fd5bbbfe63e900", 0x32}, 0xd, 0xfffffffffffffffd) accept$alg(0xffffffffffffffff, 0x0, 0x0) 17:11:03 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) 17:11:03 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/60, 0x0, 0x3c, 0xfffffffe}, 0x20) [ 608.751184] vhci_hcd: connection closed [ 608.751368] vhci_hcd: stop threads [ 608.765717] vhci_hcd: release socket 17:11:03 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$assume_authority(0x10, r0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x400, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4019}, 0x4004040) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) [ 608.794690] vhci_hcd: disconnect device 17:11:03 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0x1}, 0x20) socket(0x26, 0xa, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x4}, 0x8) 17:11:04 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/52, 0x58, 0xffffffffffffff8e, 0xffffffff}, 0xfffffffffffffd78) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000100), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000140)={'wg1\x00'}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000080)) 17:11:04 executing program 0: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000040)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:04 executing program 4: socket(0x6, 0xa, 0x8) r0 = socket(0x8, 0x4, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000100)=""/20, &(0x7f0000000140)=0x14) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @sco={0x1f, @none}, @nl=@unspec, @qipcrtr={0x2a, 0x0, 0xfffffffe}, 0x6, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000000)='lo\x00', 0x18, 0x7, 0x1}) 17:11:04 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x29, 0x3b}, 0xffffffffffffffb4) 17:11:04 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in, @in=@dev}}, {{@in=@multicast2}}}, &(0x7f0000000180)=0xe8) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r1 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r1, 0x0, 0x0) request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='}\\(]!,\x00', r1) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in6=@private2}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) accept$packet(r1, 0x0, &(0x7f00000001c0)) 17:11:04 executing program 4: r0 = socket(0x2c, 0x0, 0x9) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000880)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000840)={&(0x7f0000000080)={0x7a0, 0x0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@WGDEVICE_A_PEERS={0x78c, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "e11cd4bb85a731d17113b7823a74a0deb6d4193a7f47313ca150431c3234467a"}]}, {0x4a8, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x368, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5}}]}, {0x4}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x41}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5, 0x3, 0x3}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x11}}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x124, 0x9, 0x0, 0x1, [{0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x30}}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x39}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}]}, {0x294, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x278, 0x9, 0x0, 0x1, [{0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x41}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x3f}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x5, 0x3, 0x3}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8, 0x3, 0x8}]}]}]}, 0x7a0}}, 0x8010) setsockopt$packet_int(r0, 0x107, 0x3, &(0x7f0000000000)=0xfffffffc, 0x4) 17:11:04 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/62, 0x0, 0x3e}, 0x20) ioctl$CHAR_RAW_SECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000040)) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x9, 0x60f}) 17:11:04 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0x1}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x5}, 0x8) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:04 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000126bd7000ffdbdf250a00000005002900000000000500370000000000080039000104000008003b000600000005002a0001000000080032007300000008000600", @ANYRES32=r2, @ANYBLOB="05002f00010000000a000900aaaaaaaaaa3f00000500290001080000"], 0x68}, 0x1, 0x0, 0x0, 0x80d0}, 0x40) bpf$BPF_BTF_LOAD(0x7, 0xffffffffffffffff, 0xe3) 17:11:04 executing program 5: keyctl$assume_authority(0x10, 0x0) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:04 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="440f20c0663501000000440f22c0baa000b008ee0fe2980d00ea12005d00666765660f388183e3000000d322baf80c66b8698a6a8566efbafc0cb000ee0f01ca0f78afe1676464260fc75f76", 0x4c}], 0x1, 0x27, &(0x7f0000000100)=[@flags={0x3, 0xa0200}, @cstype0={0x4, 0xa}], 0x2) socket(0x1d, 0x0, 0x9) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x1d1880, 0x0) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) accept$packet(r3, 0x0, &(0x7f0000000180)) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000) 17:11:04 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x428, 0x3f4, 0x20, 0x70bd25, 0x25dfdbff, {0x2, 0x0, 0x25, [0xa14, 0x3, 0x4, 0x5, 0x7b, 0xfffffff9, 0x4, 0x5, 0x1f80, 0x6, 0x5, 0x80, 0x6, 0x7, 0x1, 0x5, 0x0, 0x515, 0x38, 0x2, 0x4, 0x40, 0x8, 0x8, 0x800, 0xfff, 0x7f, 0x95a4, 0x8001, 0x2134, 0x3, 0xffffffe1, 0x4, 0x2, 0x2, 0xffffffff, 0x9, 0x1bad4000, 0x9, 0xe49, 0x1ff, 0x5, 0x5, 0xff, 0x9, 0xffffffff, 0x101, 0xb932, 0x3b, 0x2, 0x372, 0xfffffffa, 0x5, 0x10000, 0xbab, 0x76, 0x1, 0x81, 0x5, 0x7f, 0x7, 0x7, 0x81, 0x80000001], [0x7fffffff, 0x4, 0x10000, 0x8000, 0x1, 0x9, 0x1, 0x9, 0x401, 0x6, 0x4, 0x2, 0x7, 0x401, 0xffffc000, 0x6, 0x8000, 0x6, 0x1, 0x0, 0xffffff01, 0x0, 0x7, 0x20, 0x8, 0x0, 0x1, 0x1ff, 0x9, 0x9c96, 0x924, 0x401, 0x0, 0x80, 0x80000001, 0x401, 0x10000, 0xd20, 0x0, 0x3f, 0x7, 0x3, 0x3, 0x7fff, 0x2, 0xffff0001, 0xfffffff8, 0x7f, 0xa81, 0xee8e, 0x3, 0x10000, 0xa7d, 0x6, 0x0, 0x40, 0x3, 0x7, 0x3, 0x5d2, 0xfffffc7a, 0x0, 0x5, 0x80000001], [0x8, 0x4000000, 0x6, 0x81, 0x6, 0xfffffff8, 0x314213a2, 0x6, 0x5, 0xffff600c, 0x3, 0x0, 0x6, 0x9, 0xf0, 0x800, 0x116d, 0x3ff, 0x100, 0x2, 0x7, 0x0, 0x1, 0x7fff, 0x2, 0x2, 0x9, 0xc2, 0xa9d3, 0x9, 0xffff9f87, 0x81, 0x400, 0x6, 0x8, 0x7, 0x6, 0x1, 0x400, 0x200, 0xffff0000, 0xffffff10, 0x652, 0x1, 0x9, 0x7, 0x4, 0x6, 0x9, 0x8, 0x7fffffff, 0x800, 0xffff, 0xfffffffe, 0x8001, 0x400, 0x62, 0xb7, 0x800, 0x8, 0x3, 0x0, 0x4, 0x400], [0x0, 0x10001, 0x7, 0x8bc, 0x10000, 0x383, 0x3, 0x80000001, 0xb535, 0x58ac, 0x101, 0x0, 0x4, 0x101, 0x8, 0x9, 0x2, 0x0, 0x401, 0x8acb, 0x18, 0x3, 0x2, 0x0, 0xd92, 0x1, 0xffffffff, 0x95, 0x2, 0x7, 0x200, 0x8, 0x400, 0x6, 0x7, 0x4, 0x401, 0x2, 0x8000, 0x0, 0x2, 0x9, 0x2, 0x1ff, 0x9, 0x4a, 0x0, 0x6, 0x6, 0x1000, 0x5, 0xfffffffc, 0x3, 0x6, 0x10001, 0x10001, 0x5, 0xa26adf6, 0x6, 0x63, 0x5, 0x6, 0xf73, 0xd89b0000], 0x8, ['\x00', '{.%(\xbf[\x00']}, [""]}, 0x428}, 0x1, 0x0, 0x0, 0x805}, 0x80) 17:11:04 executing program 1: accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x1010, 0x464, 0x4, 0x70bd26, 0x25dfdbfb, "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", [""]}, 0x1010}, 0x1, 0x0, 0x0, 0x200080d0}, 0x4) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/60, 0x0, 0x3b}, 0xf) 17:11:04 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4002, 0x0) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f6, 0x200, 0x70bd27, 0x25dfdbfc, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40004}, 0x50) gettid() shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffc000/0x3000)=nil) 17:11:04 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200027bd7000fddbdf650100000000000000014100000018001700000012ffffffff7564703a73797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x48014) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x2}) 17:11:04 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0xc4000, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x8, 0x3, 0x9, 0xffffff81, 0x7f, 0x8, 0x6, 0x3ff], 0x8, 0x80800, 0x0, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000040)={0x5, 0x51, 0xfa00, {&(0x7f00000003c0), r0}}, 0x18) 17:11:04 executing program 4: socket(0x8, 0xa, 0x1) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) 17:11:04 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000000)=""/187, &(0x7f00000000c0)=0xbb) 17:11:04 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0x1}, 0x20) 17:11:04 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$CHAR_RAW_IOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000000)) 17:11:04 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) read$proc_mixer(r0, &(0x7f0000000180)=""/4096, 0x1000) 17:11:04 executing program 3: getuid() r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x38, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4048000) 17:11:04 executing program 4: r0 = socket(0x1d, 0x0, 0x9) setsockopt$inet_dccp_int(r0, 0x21, 0x4, &(0x7f0000000000)=0x3, 0x4) 17:11:04 executing program 1: sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x409b}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x800}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x7f}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008800) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1c000}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x80}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xfffffbff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x48010) 17:11:04 executing program 2: keyctl$clear(0x7, 0xfffffffffffffffe) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) gettid() 17:11:04 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') 17:11:04 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/60, 0x0, 0xffffffffffffffdc}, 0x20) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x7a47], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) getgid() r2 = request_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)=':\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, r2, 0xfffffffffffffffd, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') 17:11:04 executing program 4: socket(0x1d, 0x0, 0x9) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x20}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8800) 17:11:04 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000080)=""/67, 0x0, 0x43}, 0x20) 17:11:04 executing program 1: msgget$private(0x0, 0x9) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:04 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/52, 0x0, 0x34}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1204735062658a6ba88c58e8bdd7da80ec356ff711b0f76d52de175b74d136e00652942e75cdf06ec4acbecf46aef16aa7258cb5895cd986af335c87ba0212fa3aa572b87f33591fe3840c868073b0f21a2a719cd52c6cd3ec64db5baa59f2f59da3bcf2301b03000000000096509601f459372bf2f6862c1daa2cafa754d2d300"/154, @ANYRES16=0x0, @ANYBLOB="000327bd7000ffdbdf25000000000c000f000600000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40000) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}, 0x10) 17:11:04 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_open_dev$char_raw(&(0x7f0000000200)='/dev/raw/raw#\x00', 0x1, 0x101000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5e78f559}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8000}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x51) 17:11:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) 17:11:04 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/65, 0x0, 0x41}, 0x20) 17:11:05 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20004004}, 0x20008815) 17:11:05 executing program 4: r0 = socket(0x1d, 0x0, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req={0x1, 0xb20, 0x5, 0x1}, 0x10) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000500)="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", 0x251) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x2b, 0xfff, 0x1, 0x5}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20048081}, 0x1) 17:11:05 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x20000, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x9, 0x7}) 17:11:05 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 17:11:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) 17:11:05 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000000)=0x8) 17:11:05 executing program 5: sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x800}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000044}, 0x40004) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000040)=""/149, &(0x7f0000000100)=0x95) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200)='l2tp\x00') sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2a000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x44040}, 0x4000000) read$rfkill(0xffffffffffffffff, &(0x7f0000000000), 0x8) accept$alg(0xffffffffffffffff, 0x0, 0x0) 17:11:05 executing program 4: socket(0x1d, 0x0, 0x9) socket$nl_audit(0x10, 0x3, 0x9) 17:11:05 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/66, 0x0, 0x42}, 0x20) 17:11:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score\x00') bind$bt_sco(r1, &(0x7f0000000040), 0x8) 17:11:05 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$proc_mixer(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="535045414b45520a4f4741494e20274361707475726520566f6c756d65272030303030303030303030303030303030303030300a50484f4e45494e0a4c494e453120274d61737465722043617074757265272030303030303030303030303030303030303030300a545245424c0d68ff5caa450a564944454f0a524144494f0a50434d20274d6963272030303030303030303030303030303030303030300a494d495820274c696e65272030303030303030303030303030303030303030300a50484f"], 0xc3) msgget$private(0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r0}) 17:11:05 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, @vsock={0x28, 0x0, 0x0, @host}, @qipcrtr={0x2a, 0xffffffff}, 0x4, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000000)='netdevsim0\x00', 0x20, 0x0, 0x7}) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:05 executing program 1: syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xdc, 0x464, 0x20, 0x70bd2d, 0x25dfdbfc, "de025edcc293632192dba44690b7414a751d7d1dc447358213d42ba545713ea7b427f6e40f4847e0cb9ad1ab9918db15cc5d80819cf87473f449eecaa2f99ebe2cff361dce16a2ef3342cde7899e644ca919013adfa43d7604a7a9732897725eaa017eb14c6f6168158f10c98cba1235d90785d2e5f2f9f9c1e003b7d9f82d6f53205027d70f9adbde3cfc9e6ceb0c704121edf413f3517c401f16ba645dbc1470fbe06475f524a058d832dd81ddc38ed3702dac7e05ced3bbf7b10a070d460cb4f6ddbad2ba37de9c", ["", "", "", "", "", "", "", "", ""]}, 0xdc}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x6}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40091}, 0x20000080) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') 17:11:05 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x2, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x40}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x8880) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:05 executing program 4: r0 = socket(0x1d, 0x0, 0xfff) accept4$alg(r0, 0x0, 0x0, 0x180800) 17:11:05 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, 0x0) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14, 0x0) getsockopt$packet_buf(r1, 0x107, 0xd, &(0x7f0000000080)=""/163, &(0x7f0000000140)=0xa3) 17:11:05 executing program 0: r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6}, 0x10) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/nfsfs\x00') sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r0, 0x10, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x200400c0) r5 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x1, 0x1) ioctl$CHAR_RAW_RRPART(r5, 0x125f, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x9}, 0x8) 17:11:05 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/32, 0x0, 0x20}, 0x20) 17:11:05 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f0000000100)=""/59, 0x0, 0xfffffe6c}, 0x20) 17:11:05 executing program 4: semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)=""/4096) socket(0x1d, 0x0, 0x9) 17:11:05 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x91}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @dev={0xfe, 0x80, [], 0x2b}}]}, 0x40}, 0x1, 0x0, 0x0, 0xc000}, 0x80) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x400, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20) 17:11:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:05 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/75, 0x0, 0xfffffffffffffe39, 0x8}, 0x20) [ 610.670325] device batadv_slave_1 entered promiscuous mode [ 610.699041] device batadv_slave_1 left promiscuous mode 17:11:05 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/62, 0x0, 0x3e, 0xfffffffd}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c030000", @ANYRES16=r1, @ANYBLOB="00082abd7000fbdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="4400028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="4001028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400d7000000080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400ea00000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f73746174730000000000000000000000000000000000000005000300000008000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600"/120, @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="9c01028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000200000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400ff00000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040001000000"], 0x34c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) accept$alg(0xffffffffffffffff, 0x0, 0x0) 17:11:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x401, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xd4, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @priority={{{0x0, 0x1, 'priority\x00'}, {}, {0x0, 0x4, 0x8}}, {0x0, 0x6, r1}}}]}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket(0x1d, 0x0, 0x9) [ 610.731885] device batadv_slave_1 entered promiscuous mode [ 610.755602] device batadv_slave_1 left promiscuous mode 17:11:05 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000040)=""/39, 0x0, 0x3b}, 0x19) 17:11:05 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x41400, 0x0) getsockopt$packet_buf(r0, 0x107, 0x5, 0x0, 0x0) 17:11:05 executing program 1: shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffe000/0x1000)=nil) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r1, 0x1, 0x6}, 0x10) syz_usbip_server_init(0x3) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getaddrlabel={0x40, 0x4a, 0x2, 0x70bd28, 0x25dfdbfd, {0xa, 0x0, 0x20, 0x0, r1, 0x80000001}, [@IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @IFAL_LABEL={0x8, 0x2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x20000) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:05 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = add_key$fscrypt_v1(&(0x7f000000ea00)='logon\x00', &(0x7f000000ea40)={'fscrypt:', @auto=[0x30, 0x33, 0x35, 0x5c, 0x31, 0x0, 0x34, 0x36, 0x61, 0x66, 0x31, 0x36, 0x0, 0x39, 0x33, 0x64]}, &(0x7f000000ea80)={0x0, "91317549245c270e8add5bfe660f5c2bfd6674c9c066ba8f2e3d5bffa8d146374e02ea39b2e2bc2dd8e9e23adef70cbe89ff4841800356b872e00ceaeba0b1e7"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, 0x0, 0x0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000180)='!\\&\x00', r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x408000, 0x0) sendmsg$AUDIT_SET(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x3e9, 0x400, 0x70bd28, 0x25dfdbfd, {0x18, 0x0, 0x2, 0xffffffffffffffff, 0x2, 0x7, 0x3, 0x1a41, 0x0, 0x8}, ["", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40) keyctl$unlink(0x9, 0x0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='user\x00', &(0x7f0000000040)='\x00') 17:11:05 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) [ 610.881043] device batadv_slave_1 entered promiscuous mode [ 610.917750] device batadv_slave_1 left promiscuous mode [ 610.924168] device batadv_slave_1 entered promiscuous mode 17:11:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) [ 610.943813] device batadv_slave_1 left promiscuous mode 17:11:05 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0xfffffffd, 0x0, 0x6b7, 0x7, 0x16f, 0x9, 0x20e, 0x7, 0x3], 0xa, 0x800, 0x0}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000080)={r1}) 17:11:05 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x321c2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xa9c, @loopback, 0x3}}}, 0x30) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) ioctl$CHAR_RAW_IOOPT(r0, 0x1279, &(0x7f0000000040)) setsockopt$inet_dccp_int(r0, 0x21, 0x6, &(0x7f0000000000)=0xad, 0x4) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:05 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='P\x00@\x00', @ANYRES16=0x0, @ANYBLOB="100028bd7000fddbdf250a0000000a000900aaaaaaaaaabb000005002a0000000000050033000200000005002e000100000005002e000000000005002e000100000005002f0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4080) r1 = socket(0x1d, 0x0, 0x9) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002cbd7000fcdbdf250300000005000700020000000800090004000000050004007f00000008001800ac1414aa140008007767320000000000000000000000000005000d0001000000140008006d6163766c616e30000000000000000008001900e000000106000300000200000500210001000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 17:11:05 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/arp\x00') connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @none}, 0x8) [ 610.980107] device batadv_slave_1 entered promiscuous mode [ 611.003684] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 611.009515] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 17:11:05 executing program 3: socket$packet(0x11, 0x2, 0x300) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80800) getsockopt$packet_buf(r1, 0x107, 0x16, 0x0, 0x0) 17:11:05 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c0000002200010025bd7000fcdbdf250ab080040900008000000000882fedf595c79023a8e09040ff37136c49a903fde07c93cd5a470c4800da10ed48248d1c44b90046985f56d46113f2b08f64273c489854a5703979f8f6254b7e6cfab1366ad7"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x2000) ioctl$CHAR_RAW_SECDISCARD(r0, 0x127d, &(0x7f00000001c0)=0xa) [ 611.102337] device batadv_slave_1 left promiscuous mode [ 611.114014] vhci_hcd: connection closed [ 611.114300] vhci_hcd: stop threads [ 611.121958] vhci_hcd: release socket [ 611.132291] vhci_hcd: disconnect device 17:11:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x4, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r1}, 0x4) getsockopt$packet_buf(r0, 0x107, 0xd, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x52d202, 0x0) r2 = syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x84000) ioctl$CHAR_RAW_IOMIN(r2, 0x1278, &(0x7f00000000c0)) 17:11:06 executing program 2: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4], 0x1, 0x0, 0x0, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x8, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x8004}, 0x800) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0xfffffd70}, 0x20) 17:11:06 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={0x0, &(0x7f0000000040)=""/59, 0x0, 0x3b, 0xfffffffe}, 0x20) 17:11:06 executing program 5: r0 = getgid() keyctl$chown(0x4, 0x0, 0xffffffffffffffff, r0) ioctl$CHAR_RAW_FRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)=0x101) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000014) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) 17:11:06 executing program 0: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000000)={0x0, 0xf8, 0xbd}, &(0x7f0000000040)={'enc=', 'pkcs1', ' hash=', {'sha224\x00'}}, &(0x7f00000000c0)="cb7ef669c429fe3c8b072ef2c6cec18b57f905b882ba0261c535b857439666b4d1993678b1d49e35816e14504f20721b1a56ee9c5055852732af5f95f9a104436f405bb3ec5ceb7e138553007c3225463dfa8cf907d8c62e69903313724e80cc140087e96006c69b0462e8b4bc7b8f916e5790422ce4724feced4f50b3e14395960a2b8bc1b8fcbea941285e170b322cdc2b6e94c8a3b4270726716352a221e1422a00d858a42ab546e47bb8e8f8ac7ce1af3c58e6684cfe3c5d74b2081cf3d7cdfe4d86a1505258f2870f4b0409169d629fe429895d65e4145e9492d68c5f80e5ea552a2f0ffba0c9d155bf138845482c838e441a705cb1", &(0x7f00000001c0)="59d61bb6ad5d2d341a580ec616df9f886ffb439516ce77a92057bd5709907b2213f84bdbb0368bd77427413377e53461dd78ee4e9196bf4490d53aa2b100844f5042121e703c1558bf5b69c04bf8a1a7f8d5740d1ae0274cafee80f08f42755c9170a1febfbf55344969016f745492fce433d6c45e6960416d079fecd40501813321d2a4332d53e42dc05336ccfb9465e7eaf3208a97ffccfa7127117ac938f8a480ce3263023bcb716ce44e1cf13589d129af9e44bc65c5481500c630") 17:11:06 executing program 4: r0 = semget(0x0, 0x0, 0x1) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000000)=""/193) socket(0x10, 0x2, 0x20003) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0xb6e7], 0x1, 0x800, 0x0, 0xffffffffffffffff}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x0, 0x0}, 0xfffffffffffffe2b) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x3, 0x5, 0xafef, 0x7}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x8000) 17:11:06 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000080)=""/60, 0x0, 0x3b, 0x1}, 0xffffffffffffffb7) 17:11:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) [ 611.615063] device batadv_slave_1 entered promiscuous mode [ 611.621373] device batadv_slave_1 left promiscuous mode [ 611.625438] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(3) [ 611.632531] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 17:11:06 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, &(0x7f0000000100)=""/43, 0x0, 0x2b}, 0x20) ioctl$CHAR_RAW_FLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000000)=0x75b) 17:11:06 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) read$proc_mixer(r0, &(0x7f0000000180)=""/201, 0xc9) 17:11:06 executing program 4: sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x20, 0x70bd27, 0x25dfcbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x1a}, 0x1, 0x0, 0x0, 0x20044800}, 0x20000004) 17:11:06 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b, 0x1}, 0xa3) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x106, 0x4}}, 0x20) 17:11:06 executing program 3: shmget$private(0x0, 0x4000, 0xa0, &(0x7f0000ffc000/0x4000)=nil) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x229500, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r2, 0x0, 0x0}, 0x10) setsockopt$inet_dccp_buf(r2, 0x21, 0x80, &(0x7f00000000c0)="0ac6a5184481bb120a0eb93e66fd18a5ff35c12c5f7679e900f8d0668c61f566974684e8d2851b750105b031a6e2e8bbcb631508d96b4ea635a6b4590e0b525b849228b3d476d4", 0x47) getpeername$packet(r1, &(0x7f0000000040), &(0x7f0000000080)=0x14) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r3, 0x0, 0x0}, 0x10) getpeername$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0xffffffffffffffff) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:06 executing program 5: write$tcp_mem(0xffffffffffffffff, &(0x7f0000000000)={0x5, 0x20, 0x10001, 0x20, 0x1}, 0x48) 17:11:06 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0xb}}, 0x20) 17:11:06 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/46, 0x0, 0x2e}, 0x20) 17:11:06 executing program 4: setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @random="89066e888c6e"}, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x1, 0xfffffffb, 0x7, 0x52edc19, 0x80000001, 0xe079, 0x9, 0xa398], 0x8, 0x800, 0x0, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd7000fddbdf2505000000060001000b00000014001f000000000000000000000000000000000105000d0002000000050013009700000014001f000000000000000000000000edff000000"], 0x54}, 0x1, 0x0, 0x0, 0x20004010}, 0x4000) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer\x00', 0xfec03d122f3e0b1e, 0x0) socket(0x22, 0x6, 0x402) 17:11:06 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000180), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001640)=ANY=[@ANYBLOB="9feb010018000000000000003d0000003d000000070040000b0000000000000c050000000c0000000300000f0100000005000000f9ffffff0800000004000000070000000300000001000000070000e10400000048000000006100613030002655e90245a2693ccaae297cbc599961bfd3370a4332640b1b20cb7b9cc3e07c578863bda532d1ddf978fa586f03650a3143358983971ecbe452a00cb0c255b7"], &(0x7f0000000080)=""/62, 0x5f, 0x3e}, 0x20) r0 = socket(0x6, 0x5, 0x1f) recvmsg$kcm(r0, &(0x7f0000001600)={&(0x7f00000001c0)=@isdn, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/174, 0xae}, {&(0x7f0000000500)=""/121, 0x79}], 0x5, &(0x7f0000000600)=""/4096, 0x1000}, 0x40000000) [ 611.917975] usb 11-2: new high-speed USB device number 2 using vhci_hcd [ 611.925563] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 611.933324] ================================================================== [ 611.940900] BUG: KASAN: null-ptr-deref in kthread_stop+0x72/0x6b0 [ 611.947136] Write of size 4 at addr 000000000000001c by task kworker/u4:0/7 [ 611.954238] [ 611.955887] CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 4.19.163-syzkaller #0 [ 611.963240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.972597] Workqueue: usbip_event event_handler [ 611.977346] Call Trace: [ 611.979940] dump_stack+0x1fc/0x2fe [ 611.983584] kasan_report_error.cold+0x15b/0x1c7 [ 611.988340] ? kthread_stop+0x72/0x6b0 [ 611.992227] kasan_report+0x8f/0x96 [ 611.995857] ? kthread_stop+0x72/0x6b0 [ 611.999752] kthread_stop+0x72/0x6b0 [ 612.003486] vhci_shutdown_connection+0x9d/0x280 [ 612.008254] ? mark_held_locks+0xa6/0xf0 [ 612.012316] ? kfree+0x110/0x210 [ 612.015688] ? event_handler+0x14c/0x4f0 [ 612.019759] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 612.024350] event_handler+0x1f0/0x4f0 [ 612.028243] process_one_work+0x864/0x1570 [ 612.032485] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 612.037166] worker_thread+0x64c/0x1130 [ 612.041154] ? process_one_work+0x1570/0x1570 [ 612.045664] kthread+0x33f/0x460 [ 612.049032] ? kthread_park+0x180/0x180 [ 612.053023] ret_from_fork+0x24/0x30 [ 612.056746] ================================================================== 17:11:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x40000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/50, 0xfffffffffffffcdf, 0x3c, 0x3d}, 0x11) 17:11:06 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/73, 0x0, 0x49}, 0x20) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="b8c8ad000000", @ANYRES16=0x0, @ANYRES64], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 17:11:06 executing program 4: r0 = socket(0x1d, 0x0, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:11:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) socket(0x5b5242dba4bdf769, 0x1, 0xffffffff) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x3, 0x0, 0x2, 0x7, 0x9, 0x200, 0x7fff, 0x7, 0x5, 0x0], 0xa, 0x81000, 0x0, 0xffffffffffffffff}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x1, 0x45, 0x5, 0x1000, 0x1ff, 0x0, 0x4}, 0x1c) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) 17:11:06 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) [ 612.064099] Disabling lock debugging due to kernel taint 17:11:06 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0xc}, 0x20) 17:11:06 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000000)=""/59, 0x0, 0x3b}, 0x20) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x15}, 0x891) 17:11:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') 17:11:06 executing program 4: socket(0xf, 0x0, 0xb) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r0, 0x0, 0x0}, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x34, r1, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffff9}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8040}, 0x4040844) 17:11:06 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f0000000180)=""/43, 0x0, 0xfffffffffffffe27}, 0x20) keyctl$clear(0x7, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3fa, 0x400, 0x70bd27, 0x25dfdbfd, {0x1, 0x1, 0x1}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x4044895) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x8ce, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, r0}}, 0x30) 17:11:07 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={0x0, &(0x7f00000000c0)=""/68, 0x0, 0x44, 0x1}, 0xfffffffffffffed7) 17:11:07 executing program 4: socket(0x36, 0x80f, 0x8) 17:11:07 executing program 0: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x3f9, 0x100, 0x70bd25, 0x25dfdbfb, {0x0, 0x7}, ["", "", "", ""]}, 0x18}}, 0x40000) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/49, 0x0, 0x31}, 0x20) 17:11:07 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, &(0x7f0000000100)=""/59, 0x0, 0x3b}, 0x20) r0 = msgget$private(0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x7f}) r1 = getgid() r2 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x1, 0xffffffffffffffff, r1, 0x0, 0xee00, 0x90, 0x101}, 0x0, 0x0, 0xddbf, 0x8, 0x3, 0x688, 0x0, 0x9, 0x0, 0x7ff, 0xffffffffffffffff, r2}) 17:11:07 executing program 3: getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) connect$packet(r0, &(0x7f0000000000)={0x11, 0x5, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm_plock\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f00)={r1, 0x0, 0x0}, 0x10) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0xffffffffffffff9e) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 17:11:07 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={0x0, &(0x7f00000000c0)=""/53, 0x1e, 0x34, 0x1}, 0x49) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x508c2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) [ 612.285398] Kernel panic - not syncing: panic_on_warn set ... [ 612.285398] [ 612.292805] CPU: 1 PID: 7 Comm: kworker/u4:0 Tainted: G B 4.19.163-syzkaller #0 [ 612.301558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.310917] Workqueue: usbip_event event_handler [ 612.315664] Call Trace: [ 612.318250] dump_stack+0x1fc/0x2fe [ 612.321882] panic+0x26a/0x50e [ 612.325080] ? __warn_printk+0xf3/0xf3 [ 612.328975] ? preempt_schedule_common+0x45/0xc0 [ 612.333740] ? ___preempt_schedule+0x16/0x18 [ 612.338146] ? trace_hardirqs_on+0x55/0x210 [ 612.342450] kasan_end_report+0x43/0x49 [ 612.346408] kasan_report_error.cold+0xa7/0x1c7 [ 612.351056] ? kthread_stop+0x72/0x6b0 [ 612.354928] kasan_report+0x8f/0x96 [ 612.358558] ? kthread_stop+0x72/0x6b0 [ 612.362428] kthread_stop+0x72/0x6b0 [ 612.366130] vhci_shutdown_connection+0x9d/0x280 [ 612.370866] ? mark_held_locks+0xa6/0xf0 [ 612.375008] ? kfree+0x110/0x210 [ 612.378360] ? event_handler+0x14c/0x4f0 [ 612.382403] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 612.386964] event_handler+0x1f0/0x4f0 [ 612.390838] process_one_work+0x864/0x1570 [ 612.395074] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 612.399727] worker_thread+0x64c/0x1130 [ 612.403687] ? process_one_work+0x1570/0x1570 [ 612.408169] kthread+0x33f/0x460 [ 612.411517] ? kthread_park+0x180/0x180 [ 612.415480] ret_from_fork+0x24/0x30 [ 612.419883] Kernel Offset: disabled [ 612.423497] Rebooting in 86400 seconds..