421, &(0x7f0000000080)={r2, 0x2}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) 04:04:18 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3, 0x1, 0x0, r3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:18 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) 04:04:18 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 1: waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:18 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 1: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:18 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3, 0x1, 0x0, r3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:18 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) 04:04:18 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:18 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:19 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:19 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:19 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141b00, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:19 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1618, 0x5463, 0x0, 0x0, r0, 0x1c4a, '\x00', 0x0, r0, 0x5, 0x2}, 0x40) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x141b00, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:19 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:19 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:04:19 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x141b00, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x0, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, &(0x7f00000001c0)) 04:04:19 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 04:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x141b00, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1618, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:19 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000001c0)) 04:04:19 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x141b00, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:19 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:19 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1618, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000001c0)) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa53, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x1618, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:20 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000001c0)) 04:04:20 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x5463, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)) 04:04:20 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1c4a, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:20 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, &(0x7f0000000480)={{&(0x7f0000000400)={'Accelerator1\x00', {&(0x7f0000000140)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {"e37ba87ac75da3853b0e4dc12d72e25f1a6ddca8d3ca10c1c3b7aa05ba2be60a2ed02ee20bc6213684242ba31a953cfad9053757fb800f53eb648e9ac9a1382e"}, {&(0x7f0000000040)=@adf_str={@format={'Cy', '1', 'RingSymRx\x00'}, {"95f92d8b33aa50e11a464fec8f2315790bfd402c18d8101f119f40ee17a1a89bae1b5afeebf84de65e2c239509b7ea702d3fc93ffd6140621bebb9c03af37084"}}}}}, {&(0x7f0000000380)={'Accelerator1\x00', {&(0x7f00000002c0)=@adf_str={@bank={'Bank', '2', 'InterruptCoalescingNumResponses\x00'}, {"c25890f3393699b5eb8bd7200f3897857d46a93778932f1a18fc0e70049eb1ffc5fead235ea6a20a2deb8b9d2204afef86b92b036bfbb093eb0e73853f03a00a"}, {&(0x7f0000000200)=@adf_str={@normal='NumberDcInstances\x00', {"205dc02df8f9858cc3df9f30d98fd133808632cead4677cb3d925a3581659932042a5dc78b5770cb4818935c7d73bf96d91e7bd1d9f2ebc2b9584ff7ccf0c905"}}}}}}}}}, 0xd3}) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x40) 04:04:20 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x0, &(0x7f00000001c0)) 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 04:04:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:20 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:20 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) waitid(0x1, 0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) 04:04:20 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 802.402135][T21039] QAT: failed to copy from user cfg_data. 04:04:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x40) 04:04:20 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 802.599609][T21051] QAT: failed to copy from user cfg_data. 04:04:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 802.690681][T21058] QAT: failed to copy from user cfg_data. 04:04:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 802.824131][T21065] QAT: failed to copy from user cfg_data. 04:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)={{}, 0xd3}) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 802.900491][T21073] QAT: failed to copy from user cfg_data. 04:04:21 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, &(0x7f0000000480)) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 803.102953][T21088] QAT: failed to copy from user cfg_data. 04:04:21 executing program 1: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 1: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:21 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) [ 803.387739][T21105] QAT: failed to copy from user cfg_data. 04:04:21 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:21 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:21 executing program 1: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 803.588274][T21122] QAT: failed to copy from user cfg_data. 04:04:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 803.835872][T21140] QAT: failed to copy from user cfg_data. 04:04:22 executing program 4: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 4: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 4: ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:22 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 1: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:22 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(0xffffffffffffffff, 0x40096102, 0x0) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:23 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:23 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:24 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:24 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:25 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x1, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 808.210156][ T3250] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.216492][ T3250] ieee802154 phy1 wpan1: encryption failed: -22 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:27 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:29 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:30 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:31 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:32 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:32 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:34 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:35 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0xa, 0x18, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x20, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:36 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0xc, 0x7, 0xa, 0x18, 0xffffffffffffffff}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0x8, 0x1, 0xa, 0xffffffffffffffff, 0x8}, @map={0x18, 0xb, 0x1, 0x0, 0x1}, @map={0x18, 0x3}]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000080)={r2, 0x2}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) 04:04:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) syz_usbip_server_init(0x5) 04:04:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 819.096175][T22297] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 819.102822][T22297] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:37 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 819.145846][T22297] vhci_hcd vhci_hcd.0: Device attached [ 819.181930][T22300] vhci_hcd: connection closed [ 819.185384][ T184] vhci_hcd: stop threads 04:04:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 819.247706][ T184] vhci_hcd: release socket 04:04:37 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:37 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 819.277977][ T184] vhci_hcd: disconnect device 04:04:38 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) syz_usbip_server_init(0x5) 04:04:38 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:38 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:38 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:38 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 819.800557][T22336] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 819.807284][T22336] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 819.883756][T22336] vhci_hcd vhci_hcd.0: Device attached [ 819.911482][T22337] vhci_hcd: connection closed [ 819.911807][ T184] vhci_hcd: stop threads 04:04:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) [ 819.937260][ T184] vhci_hcd: release socket [ 819.956482][ T184] vhci_hcd: disconnect device 04:04:38 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) syz_usbip_server_init(0x5) 04:04:38 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 820.499837][T22363] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 820.506415][T22363] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:39 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 820.573060][T22363] vhci_hcd vhci_hcd.0: Device attached 04:04:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 820.606738][T22364] vhci_hcd: connection closed [ 820.621386][ T184] vhci_hcd: stop threads [ 820.656770][ T184] vhci_hcd: release socket [ 820.681853][ T184] vhci_hcd: disconnect device 04:04:39 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) syz_usbip_server_init(0x5) 04:04:39 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:39 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:39 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x80}, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:39 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:39 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 821.261298][T22397] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 821.267859][T22397] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:39 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 821.306746][T22397] vhci_hcd vhci_hcd.0: Device attached [ 821.331385][T22398] vhci_hcd: connection closed [ 821.331695][ T25] vhci_hcd: stop threads [ 821.365739][ T25] vhci_hcd: release socket [ 821.390572][ T25] vhci_hcd: disconnect device 04:04:40 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_usbip_server_init(0x5) 04:04:40 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, 0x0}, 0x78) 04:04:40 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:40 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:40 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:40 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) syz_usbip_server_init(0x5) 04:04:40 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:40 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:40 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 821.924992][T22426] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 821.931642][T22426] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 821.964368][T22426] vhci_hcd vhci_hcd.0: Device attached 04:04:40 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 821.981748][T22427] vhci_hcd: connection closed [ 821.982283][ T266] vhci_hcd: stop threads [ 822.013023][ T266] vhci_hcd: release socket [ 822.036418][ T266] vhci_hcd: disconnect device 04:04:40 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 822.063142][T22436] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 822.069777][T22436] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 822.143579][T22436] vhci_hcd vhci_hcd.0: Device attached [ 822.169779][T22439] vhci_hcd: connection closed [ 822.170400][ T186] vhci_hcd: stop threads [ 822.194030][ T186] vhci_hcd: release socket [ 822.218732][ T186] vhci_hcd: disconnect device 04:04:40 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_usbip_server_init(0x5) 04:04:40 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:40 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:40 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:40 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 822.592191][T22458] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 822.598773][T22458] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:41 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_usbip_server_init(0x5) 04:04:41 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 822.646540][T22458] vhci_hcd vhci_hcd.0: Device attached [ 822.657589][T22459] vhci_hcd: connection closed [ 822.662949][ T25] vhci_hcd: stop threads [ 822.692898][ T25] vhci_hcd: release socket [ 822.704105][ T25] vhci_hcd: disconnect device 04:04:41 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 822.819486][T22472] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 822.826045][T22472] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 822.881756][T22472] vhci_hcd vhci_hcd.0: Device attached [ 822.903911][T22473] vhci_hcd: connection closed [ 822.906148][ T25] vhci_hcd: stop threads [ 822.923090][ T25] vhci_hcd: release socket [ 822.933609][ T25] vhci_hcd: disconnect device 04:04:41 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) syz_usbip_server_init(0x5) 04:04:41 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 823.273021][T22491] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 823.279759][T22491] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:41 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:41 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp, @map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 823.333498][T22491] vhci_hcd vhci_hcd.0: Device attached [ 823.346923][T22492] vhci_hcd: connection closed [ 823.347470][ T184] vhci_hcd: stop threads [ 823.367402][ T184] vhci_hcd: release socket [ 823.372140][ T184] vhci_hcd: disconnect device 04:04:41 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) syz_usbip_server_init(0x5) 04:04:42 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xb, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:42 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, 0x0, 0x20, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:42 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp, @map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:42 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 823.978030][T22522] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 823.984623][T22522] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 824.047133][T22522] vhci_hcd vhci_hcd.0: Device attached [ 824.084033][T22523] vhci_hcd: connection closed [ 824.084366][ T25] vhci_hcd: stop threads 04:04:42 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 824.094074][ T25] vhci_hcd: release socket [ 824.115537][ T25] vhci_hcd: disconnect device 04:04:43 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), 0xffffffffffffffff) syz_usbip_server_init(0x5) 04:04:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:43 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0xc9, &(0x7f0000000180)=""/201, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) [ 824.707686][T22553] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 824.714504][T22553] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 824.807694][T22553] vhci_hcd vhci_hcd.0: Device attached [ 824.844392][T22554] vhci_hcd: connection closed [ 824.844735][ T186] vhci_hcd: stop threads 04:04:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 824.858823][ T186] vhci_hcd: release socket [ 824.883803][ T186] vhci_hcd: disconnect device 04:04:43 executing program 4: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_usbip_server_init(0x5) 04:04:43 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:43 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:43 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, 0x0}, 0x78) 04:04:43 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:43 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:43 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x8180, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) syz_usbip_server_init(0x5) [ 825.510296][T22585] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 825.517983][T22585] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 04:04:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) [ 825.567819][T22585] vhci_hcd vhci_hcd.0: Device attached [ 825.597094][T22586] vhci_hcd: connection closed [ 825.597380][ T184] vhci_hcd: stop threads [ 825.608374][ T184] vhci_hcd: release socket [ 825.625285][ T184] vhci_hcd: disconnect device [ 825.700184][T22599] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 825.706872][T22599] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 825.749802][T22599] vhci_hcd vhci_hcd.0: Device attached [ 825.763259][T22600] vhci_hcd: connection closed [ 825.774707][ T186] vhci_hcd: stop threads [ 825.799155][ T186] vhci_hcd: release socket [ 825.803802][ T186] vhci_hcd: disconnect device 04:04:44 executing program 4: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_usbip_server_init(0x0) 04:04:44 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:44 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 826.205778][T22616] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 04:04:44 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@framed={{}, [@map_val, @map_val, @btf_id, @jmp, @map_val, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @map]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:44 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)={0x68, r1, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0x1aaa3}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_KEY_MODE={0x5, 0x37, 0x2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_DEV_KEY_MODE={0x5, 0x37, 0x2}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x68}}, 0x24000000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r2, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={0x0}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x8c, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wlan1\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_team\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:cpu_online_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'hsr0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x800}, 0x804) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x541b) 04:04:45 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:45 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:45 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:45 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:45 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) read$smackfs_access(r0, &(0x7f00000000c0), 0x14) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$smackfs_access(r2, &(0x7f0000000000)={'', 0x20, '{.@', 0x20, 'atbl'}, 0xa) ioctl$MON_IOCQ_URB_LEN(r1, 0x5451) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000080), 0xc, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) write$smackfs_access(r3, &(0x7f0000000040)={'&\xa4:}#,{*', 0x20, '/dev/dlm_plock\x00', 0x20, 'rtb'}, 0x1d) 04:04:45 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:45 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:46 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) r2 = syz_open_dev$usbmon(&(0x7f0000000080), 0xffff, 0x400040) ioctl$MON_IOCQ_URB_LEN(r2, 0x5450) 04:04:46 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:04:46 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x78) 04:04:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:46 executing program 5: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) r2 = syz_open_dev$usbmon(&(0x7f0000000080), 0xffff, 0x400040) ioctl$MON_IOCQ_URB_LEN(r2, 0x5450) 04:04:47 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) r2 = syz_open_dev$usbmon(&(0x7f0000000080), 0xffff, 0x400040) ioctl$MON_IOCQ_URB_LEN(r2, 0x5450) 04:04:47 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, 0x0}, 0x78) 04:04:47 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) socket$nl_xfrm(0x10, 0x3, 0x6) 04:04:47 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x18102, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5421) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x2}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x5c}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x405c) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000080)=""/111, 0x6f) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x3958c0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x10}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x14000, 0x0) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000000)) 04:04:47 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) r2 = syz_open_dev$usbmon(&(0x7f0000000080), 0xffff, 0x400040) ioctl$MON_IOCQ_URB_LEN(r2, 0x5450) 04:04:47 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) socket$nl_xfrm(0x10, 0x3, 0x6) 04:04:47 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:47 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r1, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={0x0}}, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x945a}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008001}, 0x8) 04:04:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:48 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:48 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:48 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) socket$nl_xfrm(0x10, 0x3, 0x6) 04:04:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x5452) 04:04:48 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:48 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) syz_open_dev$usbmon(&(0x7f0000000080), 0xffff, 0x400040) 04:04:48 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:48 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:48 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) 04:04:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x5452) 04:04:48 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r3, 0x5452) 04:04:49 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@map_val, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 04:04:49 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:49 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x42a000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:50 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000040)=@framed={{}, [@btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:50 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x204, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xb}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x856}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x16}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x204}, 0x1, 0x0, 0x0, 0x84}, 0x8001) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) 04:04:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:50 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0), 0x10}, 0x78) 04:04:50 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0xc01, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x2c}}, 0x0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:50 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) 04:04:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:51 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:51 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:51 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r1, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) read$hiddev(r2, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r3, 0x4}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:04:51 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:51 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:51 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x88880, 0x0) ioctl$IOCTL_STOP_ACCEL_DEV(r1, 0x40096101, &(0x7f0000000540)={{&(0x7f00000004c0)={'Accelerator\x00', {&(0x7f0000000200)=@adf_hex={@format={'Cy', '4', 'RingSymRx\x00'}, {0x2}, {&(0x7f0000000140)=@adf_str={@normal='NumberDcInstances\x00', {"26a127a7faa09de8aa4b92cd17333b662691c4208541f210c6f2e3418c1f5d83e92f4b8b2656bca394a9bbbf6788f3feed4d7067f9ff89526dbb4e38d68efa68"}}}}}, {&(0x7f0000000440)={'KERNEL\x00', {&(0x7f0000000380)=@adf_dec={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {0xb3d2}, {&(0x7f00000002c0)=@adf_dec={@normal='NumberDcInstances\x00', {0x8}}}}}}}}}, 0xa}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r2 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}) 04:04:52 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r1, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) read$hiddev(r2, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r3, 0x4}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:04:52 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:52 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={r0, 0x0}, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:52 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:52 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r1, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) read$hiddev(r2, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r3, 0x4}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:04:52 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0xa98, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:52 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:52 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r2, 0x4}) 04:04:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:52 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x1) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:53 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:53 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:04:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:53 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000040)=@framed={{}, [@map_val, @btf_id, @jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x46d, 0x1f}, 0x10}, 0x78) 04:04:53 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) 04:04:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:04:53 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r2, 0x4}) 04:04:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:53 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:53 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:53 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) 04:04:53 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r2, 0x4}) 04:04:53 executing program 3: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:53 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) 04:04:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:54 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:54 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r2, 0x4}) 04:04:54 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) socketpair(0x2b, 0x4, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@updpolicy={0x414, 0x19, 0x200, 0x70bd25, 0x25dfdbfc, {{@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e21, 0xff, 0x4e21, 0xfff8, 0xa, 0xa0, 0x80, 0x0, 0x0, 0xee01}, {0x4, 0x40, 0x3, 0xfffffffffffffffd, 0xffffffffffffff00, 0x7, 0xf91, 0x7f}, {0x1, 0x3, 0x8c, 0x1}, 0xffffa154, 0x6e6bc0}, [@algo_crypt={0x140, 0x2, {{'ctr-des3_ede-asm\x00'}, 0x7c0, "369a60a885376ab1e81d95f6a6bc77d03bbbc4df6e7c2730a749f6ab18966c591582fba1a9f32fe191512c9c4e10bd2f0cce8a27b8adc7055cbfd4b83409e1a84627b91bb013e4b9164cfe4df473ecd289eec591094df51d6afc3c250f67b22b5b646043580e9f6c5c1d819d821a0f69b084c909a621c5558e557560edb02f288cc85f336e696f384da81579dd543ab1a4dafb7c4aedc8a478c173b6fb5cd04196312ebbfa9d00c5f8fea7bff2e5f3aa8a89fe7e06b2fdad5c3b642070815ef5a074cb4ad27d92755185e8a49f98d52d826fc7ad8e3628fd82a3c298302e3eeb13a2d05da2c38a277235067145954935a3fdc610405f63da"}}, @lastused={0xc, 0xf, 0x200}, @algo_aead={0x76, 0x12, {{'morus1280-sse2\x00'}, 0x150, 0x180, "6be2a2f11e018be4ee42ba86029cb553c3112c79a352094b4032141e2a182010ad1a6782ea5274a3634d"}}, @migrate={0x180, 0x11, [{@in=@private=0xa010101, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@ipv4={'\x00', '\xff\xff', @remote}, @in=@multicast1, 0x3c, 0x2, 0x0, 0x3506, 0x2, 0x2}, {@in=@loopback, @in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010101}, @in=@multicast2, 0xe, 0x0, 0x0, 0x0, 0xa}, {@in=@rand_addr=0x64010100, @in=@multicast2, @in6=@local, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x6c, 0x7, 0x0, 0x3507, 0x2, 0x2}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@broadcast, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x8a, 0x3, 0x0, 0x3505, 0x2, 0xa}, {@in=@loopback, @in=@rand_addr=0x64010101, @in6=@mcast1, @in6=@remote, 0x0, 0x3, 0x0, 0x3500, 0x2, 0x2}]}, @proto={0x5, 0x19, 0x3c}, @replay_val={0x10, 0xa, {0x70bd29, 0x70bd28, 0x5}}]}, 0x414}, 0x1, 0x0, 0x0, 0x880}, 0x0) 04:04:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:04:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:54 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x541b) 04:04:54 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) read$hiddev(r1, &(0x7f0000000240)=""/255, 0xff) 04:04:54 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x401, 0x0, 0x10000}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="a5f10000", @ANYRES16=r1, @ANYBLOB="000328bd70010bdbdf25040001000c00f2800800060000000000140002800800080008000000060094b5669202004e2200000800050003000000f1ff050002000000e9ef65bc33ad95413e4f3af49b1e77939f128bbecbff379bd7d3e283cdb204b52fe5a4dce0567a23f82013d782dc948ffb6a16a82b8d0413ebdbf4"], 0x44}, 0x1, 0x0, 0x0, 0x8001}, 0x48010) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x800, 0x0) ioctl$HIDIOCGFIELDINFO(r2, 0xc038480a, &(0x7f0000000240)={0x1, 0x3, 0x8001, 0x9, 0x80000000, 0x1000, 0xd56769, 0x201000, 0xffff, 0x1000, 0x6, 0x3, 0x401, 0x1}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) r4 = syz_open_dev$hiddev(&(0x7f0000000280), 0x281, 0x100) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r5, 0xc018480b, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f0000000180)={0x7, &(0x7f0000000140)=[0x1, 0x475, 0x9, 0x8, 0x536, 0x4, 0x1]}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000300)={0x0}) ioctl$HIDIOCSFLAG(0xffffffffffffffff, 0x4004480f, &(0x7f0000000700)=0x1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r5, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x90, 0x0, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x20048884}, 0x4000044) ioctl$DRM_IOCTL_RM_CTX(r5, 0xc0086421, &(0x7f0000000340)={r6, 0x1}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f00000002c0)={0x0, 0x0, r4, 0x81, 0x80000}) read$hiddev(r5, &(0x7f0000000380)=""/157, 0x9d) 04:04:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) 04:04:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x9) 04:04:54 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:04:54 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x9) 04:04:54 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 04:04:54 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) 04:04:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:54 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:54 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x9) 04:04:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 04:04:55 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) 04:04:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:55 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:55 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x9) 04:04:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 04:04:55 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:04:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:55 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:55 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) 04:04:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:55 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000000340), 0xfff, 0x103000) 04:04:55 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000180)={0x0, 0x5}) 04:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 04:04:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:55 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:55 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:04:55 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, 0x0) 04:04:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) 04:04:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:55 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:55 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:55 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, 0x0) 04:04:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:55 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, 0x0) 04:04:56 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:56 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000180)) 04:04:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x4000) 04:04:56 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x4000) 04:04:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:56 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:56 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x4000) 04:04:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:56 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:56 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x101000) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x4000) 04:04:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:57 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:04:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x8c300, 0x0) ioctl$MON_IOCQ_URB_LEN(r1, 0x541b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x329a00, 0x0) getpeername$qrtr(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r4, 0xc018480b, 0x0) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) recvmsg(r3, &(0x7f000000a9c0)={&(0x7f0000000240)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a940)=[{&(0x7f000000a800)=""/72, 0x48}, {&(0x7f000000a880)=""/167, 0xa7}], 0x2, &(0x7f000000a980)=""/19, 0x13}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f000000ab00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f000000aac0)={&(0x7f000000aa00)=ANY=[@ANYBLOB="c0e20000", @ANYRES16=0x0, @ANYBLOB="200a25bd7000fcdbdf251200000008000600010000001400018008000100", @ANYRES32=r5, @ANYBLOB="08000300020000000800080020000000080006000300000008000700090000005800018008000100", @ANYRES32=r6, @ANYBLOB="08000300010000001400020000000000000000000000000000000000140002006d6163766c616e30000000000000000008000300000000001400820076657468305f746f5f626f6e6400000008000800fbffffff080007000000000008000900090000000800060002000000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) 04:04:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:57 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:57 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:57 executing program 1: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, {&(0x7f0000000140)=""/235, 0xeb, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x2, 0x2}}, 0x48) 04:04:58 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x80081, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x800, 0x101000) ioctl$MON_IOCQ_URB_LEN(r1, 0x9201) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:58 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r9, 0x4010641a, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[0x7f, 0x0, 0xff, 0x3, 0x8, 0x8001, 0xfffffff7, 0x4]}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000440)) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) 04:04:58 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x4aa0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x20081, 0x0) openat$cgroup_int(r2, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x8, [0x7f, 0x1, 0x1f, 0x6, 0x9, 0x7f, 0x95b, 0xf000]}, 0x14) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) 04:04:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r9, 0x4010641a, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[0x7f, 0x0, 0xff, 0x3, 0x8, 0x8001, 0xfffffff7, 0x4]}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000440)) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 04:04:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:58 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r9, 0x4010641a, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[0x7f, 0x0, 0xff, 0x3, 0x8, 0x8001, 0xfffffff7, 0x4]}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000440)) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, &(0x7f0000000040)=""/54, 0x2, 0x2}}, 0x48) 04:04:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000000)={r3, 0x1, r1, 0x2}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) ioctl$HIDIOCAPPLICATION(r4, 0x4802, 0x2) ioctl$MON_IOCQ_URB_LEN(r0, 0x5421) 04:04:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:58 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r9, 0x4010641a, &(0x7f0000000400)={0x8, &(0x7f00000003c0)=[0x7f, 0x0, 0xff, 0x3, 0x8, 0x8001, 0xfffffff7, 0x4]}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:58 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={&(0x7f0000002c40)=@can, 0x80, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x2, 0x2}}, 0x48) 04:04:58 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000000)={r3, 0x1, r1, 0x2}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) ioctl$HIDIOCAPPLICATION(r4, 0x4802, 0x2) ioctl$MON_IOCQ_URB_LEN(r0, 0x5421) 04:04:58 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) 04:04:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000380)) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x101) 04:04:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x48) 04:04:59 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) 04:04:59 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000000)={r3, 0x1, r1, 0x2}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) ioctl$HIDIOCAPPLICATION(r4, 0x4802, 0x2) ioctl$MON_IOCQ_URB_LEN(r0, 0x5421) 04:04:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(0xffffffffffffffff, 0xc02064c3, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x5, 0x2, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, r8], 0x4, 0x1}) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x101) 04:04:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:59 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) 04:04:59 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000000)={r2, 0x1, r0, 0x2}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) ioctl$HIDIOCAPPLICATION(r3, 0x4802, 0x2) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x0, 0x25dfdbfe, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x101) 04:04:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4, 0x0, 0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[r6, 0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, r7, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:04:59 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x9201) 04:04:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}, @IEEE802154_ATTR_CAPABILITY={0x5, 0x11, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000000)={r2, 0x1, r0, 0x2}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) 04:04:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000002cc0)=""/114, 0x72}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/184, 0xb8}, {&(0x7f0000003e00)=""/168, 0xa8}], 0x4, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_WAIT(r0, 0xc02064c3, &(0x7f0000000540)={&(0x7f0000000500)=[0x0, r4, r4, r5], 0x2, 0x4}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:04:59 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) 04:04:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000080)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x19}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000000)={r2, 0x1, r0, 0x2}) 04:04:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003f00)=""/114, 0x72}, 0x101) 04:04:59 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:04:59 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:04:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:04:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x101) 04:05:00 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000140)) 04:05:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, 0x0}, 0x101) 04:05:00 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:00 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:00 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) 04:05:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, 0x0}, 0x0) 04:05:00 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:00 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:00 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) 04:05:00 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x400b46, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:00 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_FD_TO_HANDLE(r0, 0xc01064c2, &(0x7f0000000140)={0x0, 0x1}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, r5], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:00 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x693c01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) 04:05:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:00 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, 0x0}, 0x0) 04:05:01 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(0xffffffffffffffff, 0xc00864c0, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, r4, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) 04:05:01 executing program 4: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:01 executing program 4: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x7, 0x3f, 0x3}]}) 04:05:01 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:02 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003f80)={0x0, 0x0, 0x0}, 0x0) 04:05:02 executing program 4: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 04:05:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PAGE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 04:05:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:02 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x28}}, 0x4000) 04:05:02 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 04:05:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:02 executing program 4: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x28}}, 0x0) 04:05:02 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 04:05:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_COORD_HW_ADDR={0xc}, @IEEE802154_ATTR_PAGE={0x5}]}, 0x28}}, 0x4000) 04:05:03 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 4: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 4: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {0x0, 0xa4e}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 04:05:03 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r1, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[r2, r3, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) r3 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000280)={"1847cd99cc79b8e3dbf7b123d09f5d81", 0x0, 0x0, {0x7, 0x144}, {0x2, 0x1}, 0x7, [0x8, 0x5, 0x10001, 0xffff, 0x4, 0x80, 0xff, 0x1, 0x2, 0x0, 0x9, 0x401, 0xe2a, 0x6, 0x4]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", r4, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:03 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 04:05:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:03 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000350745a410e9e7cad1473cb5789011e10bfda4743b00c6bbd5f75094823f65", @ANYRES16=0x0, @ANYBLOB="100026bd7000fddbdf25010000000c0002000400000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x24000041}, 0x40) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) r3 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000280)={"1847cd99cc79b8e3dbf7b123d09f5d81", 0x0, 0x0, {0x7, 0x144}, {0x2, 0x1}, 0x7, [0x8, 0x5, 0x10001, 0xffff, 0x4, 0x80, 0xff, 0x1, 0x2, 0x0, 0x9, 0x401, 0xe2a, 0x6, 0x4]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", r4, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 04:05:03 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) syz_open_dev$hiddev(&(0x7f0000000240), 0x28e3, 0x400040) 04:05:03 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) r3 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000280)={"1847cd99cc79b8e3dbf7b123d09f5d81", 0x0, 0x0, {0x7, 0x144}, {0x2, 0x1}, 0x7, [0x8, 0x5, 0x10001, 0xffff, 0x4, 0x80, 0xff, 0x1, 0x2, 0x0, 0x9, 0x401, 0xe2a, 0x6, 0x4]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", r4, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 04:05:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) syz_open_dev$hiddev(&(0x7f0000000240), 0x28e3, 0x400040) 04:05:03 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) r3 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r3, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:03 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 04:05:03 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:03 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:03 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) syz_open_dev$hiddev(&(0x7f0000000240), 0x28e3, 0x400040) 04:05:03 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {0x4, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:04 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x7, 0x3f, 0x3}]}) 04:05:04 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:04 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {0x0, 0x7a49}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:04 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x7, 0x3f, 0x3}]}) 04:05:04 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) write$vhost_msg(r2, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:04 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0xffffffff00000000, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:04 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x7, 0x3f, 0x3}]}) 04:05:04 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) write$vhost_msg(r1, &(0x7f00000001c0)={0x1, {&(0x7f0000000000)=""/214, 0xd6, &(0x7f0000000140)=""/96, 0x1, 0x3}}, 0x48) r2 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9, 0x1]}) 04:05:04 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:04 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x0, 0x3f, 0x3}]}) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11, 0x9]}) 04:05:04 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:04 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) r2 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:04 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(0xffffffffffffffff, 0xc01864cd, &(0x7f0000000340)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x1}) 04:05:04 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5, 0x0, 0x0, 0x3}]}) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40, 0xc11]}) 04:05:04 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:04 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:04 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) r1 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:04 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001, 0x40]}) 04:05:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x5}]}) 04:05:04 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:05 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:05 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000480)={"38bad062fbe90d93c3665999bfc61272", 0x0, 0x0, {0x7, 0x6}, {0x9, 0x7}, 0x467, [0x0, 0x40, 0x40, 0xc000000000000000, 0x4, 0xfffffffffffffffa, 0x8001, 0x40000000, 0x8000, 0x45, 0x7fffffff, 0x0, 0x7, 0x4, 0x100000001, 0x6]}) r1 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001]}) 04:05:05 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, 0x0) 04:05:05 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1}) 04:05:05 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) r1 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001]}) 04:05:05 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1}) 04:05:05 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1}) 04:05:05 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getpgid(0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:05 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, 0x0}) 04:05:05 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x8001]}) 04:05:05 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1}) 04:05:05 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:05 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) 04:05:05 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000000c0)='ns/user\x00') ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x6, 0x0, 0x2}) recvmsg(r0, &(0x7f00000305c0)={&(0x7f0000030280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000030540)=[{&(0x7f0000030300)}, {&(0x7f0000030340)=""/174, 0xae}, {&(0x7f0000030400)=""/104, 0x68}, {&(0x7f0000030480)=""/72, 0x48}, {&(0x7f0000030500)=""/11, 0xb}], 0x5}, 0x20000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', r2, 0x18, r3, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16, r0}, 0x78) syz_open_dev$hiddev(&(0x7f0000000240), 0x28e3, 0x400040) 04:05:05 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0xfffffffffffff801, 0x0, 0x40]}) 04:05:05 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_SIGNAL(r0, 0xc01864cd, &(0x7f0000000340)={0x0, 0x0}) 04:05:05 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:05 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xab3d, 0x0, 0x0, 0x0, 0x9}, [@exit, @alu={0x7, 0x1, 0xc, 0x8, 0x6, 0x0, 0x8}, @alu={0x7, 0x1, 0xa, 0x1, 0x9, 0x2, 0x10}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:05 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) r7 = syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r8, 0xc018480b, 0x0) connect$nfc_raw(r8, &(0x7f00000004c0)={0x27, 0x1, 0x1, 0x2}, 0x10) write$smackfs_netlabel(r1, &(0x7f0000000440)=@l2={{0x7fffffff, 0x2e, 0x2, 0x2e, 0x1, 0x2e, 0x1}, 0x2f, 0x1, 0x20, '/dev/usbmon#\x00'}, 0x78) ioctl$DRM_IOCTL_GET_STATS(r7, 0x80f86406, &(0x7f0000000040)=""/150) 04:05:05 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x2, 0x0, 0x0, 0x40]}) 04:05:05 executing program 3: r0 = syz_open_dev$vim2m(0x0, 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:05 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000000)={r1, 0x33, 0x1, "67614222ef9d227e2b5f43f4f82e533896ebfff5d17c42902b65978042f0e46f079a33a1baf63f00d1fab20bc1e7a6d699a6195911b2e491fc84782f45df5a0acc2325b783ce5d2b7634"}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:06 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:05:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) r7 = syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r8, 0xc018480b, 0x0) connect$nfc_raw(r8, &(0x7f00000004c0)={0x27, 0x1, 0x1, 0x2}, 0x10) write$smackfs_netlabel(r1, &(0x7f0000000440)=@l2={{0x7fffffff, 0x2e, 0x2, 0x2e, 0x1, 0x2e, 0x1}, 0x2f, 0x1, 0x20, '/dev/usbmon#\x00'}, 0x78) ioctl$DRM_IOCTL_GET_STATS(r7, 0x80f86406, &(0x7f0000000040)=""/150) 04:05:06 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x3, 0x0, 0x0, 0x0, 0x40]}) 04:05:06 executing program 3: r0 = syz_open_dev$vim2m(0x0, 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:06 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:05:06 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) r7 = syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r8, 0xc018480b, 0x0) connect$nfc_raw(r8, &(0x7f00000004c0)={0x27, 0x1, 0x1, 0x2}, 0x10) write$smackfs_netlabel(r1, &(0x7f0000000440)=@l2={{0x7fffffff, 0x2e, 0x2, 0x2e, 0x1, 0x2e, 0x1}, 0x2f, 0x1, 0x20, '/dev/usbmon#\x00'}, 0x78) ioctl$DRM_IOCTL_GET_STATS(r7, 0x80f86406, &(0x7f0000000040)=""/150) 04:05:06 executing program 3: r0 = syz_open_dev$vim2m(0x0, 0x4, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:06 executing program 1: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, r1}) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000300)={&(0x7f00000002c0)=[0x0], 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r2, 0xc018480b, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r2, 0xc00864c0, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r2, 0xc00864c0, &(0x7f0000000280)={r3}) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000000240)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4], &(0x7f0000000200), 0x8, 0x1}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x506242, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x60040, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r5, 0xc018643a, &(0x7f0000000100)={0x3e, 0xc8, 0x21}) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r6, 0x641e) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xd00, 0x0) ioctl$MON_IOCQ_URB_LEN(r7, 0x5450) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 04:05:06 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:06 executing program 1: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r7, 0xc018480b, 0x0) connect$nfc_raw(r7, &(0x7f00000004c0)={0x27, 0x1, 0x1, 0x2}, 0x10) write$smackfs_netlabel(r1, &(0x7f0000000440)=@l2={{0x7fffffff, 0x2e, 0x2, 0x2e, 0x1, 0x2e, 0x1}, 0x2f, 0x1, 0x20, '/dev/usbmon#\x00'}, 0x78) 04:05:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) 04:05:06 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:06 executing program 1: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:06 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r7, 0xc018480b, 0x0) connect$nfc_raw(r7, &(0x7f00000004c0)={0x27, 0x1, 0x1, 0x2}, 0x10) 04:05:06 executing program 3: syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x10000, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) 04:05:06 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:06 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r7, 0xc018480b, 0x0) 04:05:06 executing program 1: r0 = syz_open_dev$vivid(0x0, 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:06 executing program 3: syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) 04:05:06 executing program 1: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0xe9, &(0x7f0000000140)=""/233, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:05:07 executing program 3: syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x1, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:07 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 1: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:07 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 1: syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, 0x0) 04:05:07 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:07 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f00000002c0)={r5, 0x1, r1, 0xfff, 0x80000}) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 04:05:07 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {0x0, 0xa97b}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:07 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:07 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:07 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:07 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:07 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {0x101, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:08 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000040)) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 4: r0 = syz_open_dev$vivid(&(0x7f0000000080), 0x2, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"fa1274155b01959efcca95c864de235d", 0x0, 0x0, {}, {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}) 04:05:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000030600)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:08 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r4, 0x40182103, &(0x7f00000002c0)={r5, 0x1, r1, 0xfff, 0x80000}) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x410140, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000030640)={0x3, 0x9, 0x1, 0x6}, 0x10, 0x6e16}, 0x78) 04:05:08 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r2, 0x5452) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r4, 0x80404806, &(0x7f0000000600)) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$MON_IOCG_STATS(r2, 0x80089203, &(0x7f0000000300)) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f00000002c0)={r6, 0x1, r2, 0xfff, 0x80000}) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getspdinfo={0x14, 0x25, 0x400, 0x70bd27, 0x25dfdbff, 0x10001, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) 04:05:08 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {0x0, 0x7}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:08 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6e16}, 0x78) 04:05:08 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) ioctl$MON_IOCQ_URB_LEN(r0, 0x2) 04:05:08 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x4, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:08 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000240)) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000300)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000030680)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 04:05:08 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4, 0x3]}) 04:05:08 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x404, 0x9, 0x1, 0x8}, {0x8, 0xd0, 0x1, 0x7ff}, {0x1, 0x9d, 0x3f, 0xfd2d}]}) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00000003001656b78baa2d2a2748738e17e915734196e74754fc440221a773b66c6630038f1be17d647daf0b6f5554318e33761793c80f5fa4fe857aca8a4716a6c6c0ad7f3233da48f25551a3792e5a15a6ef846f436b14f5726677700dcd0cd8761592bb6704be2d9349d505d5cda720384555588b09a436716e8cfda2e83814d87b83b70cbe9f505d656b2864590edfde1330cc0ea21ecb51cfbd054dbf2e6d0c62d91698e39a42e0bd46f11b6fbdf370e602f29ab53f7ee6746ac5b44e840e3c41fbc24a7e24112eb64de0be89af0f36bd7889dd8f3abe2dde98134f2063127904ca85f048767d2b7d08b5c9026f169c1acd10b2fa92d64218a32a4145b139b7ae7732534127d5a754a0a943db192277c89079c3431dbe058a6d988ace6a575e7d48f192f2ed4272608dae81a2"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x4c0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x4, 0x0, 0x9, 0xf2}) restart_syscall() ioctl$MON_IOCQ_URB_LEN(r0, 0x2) 04:05:08 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001, 0x4]}) 04:05:08 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) ioctl$HIDIOCGNAME(r3, 0x80404806, &(0x7f0000000600)) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 04:05:08 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:08 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8, 0x10001]}) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 04:05:09 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1, 0x8]}) 04:05:09 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000, 0x1]}) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 5: ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1, 0x8000]}) 04:05:09 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:09 executing program 5: ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a, 0x1]}) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 5: ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:09 executing program 0: socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) 04:05:09 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81, 0x6e6a]}) 04:05:09 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:09 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:09 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1, 0x81]}) 04:05:10 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:10 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 2: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1, 0x1]}) 04:05:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:10 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 2: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5, 0x1]}) 04:05:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 2: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2, 0x5]}) 04:05:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="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"]) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 1: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4000) 04:05:10 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5450) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1, 0x0, 0x2]}) 04:05:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 1: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4000) 04:05:10 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:10 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199", 0x0, 0x0, {}, {}, 0x0, [0xff1]}) 04:05:10 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:10 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:10 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:10 executing program 1: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:11 executing program 3: r0 = syz_open_dev$vim2m(&(0x7f0000000240), 0x0, 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000380)={"accde4db9c61eeffffffffff18c23199"}) 04:05:11 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:11 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4000) 04:05:11 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 4: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$MON_IOCQ_URB_LEN(0xffffffffffffffff, 0x5450) 04:05:11 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r1 = syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000640)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$MON_IOCQ_URB_LEN(r1, 0x5452) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000005c0), 0x40003, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x8, 0x8, 0x8}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) 04:05:11 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/179) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:11 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0]}) 04:05:11 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$usbmon(&(0x7f0000000180), 0x200, 0x2c0203) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/179) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:11 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000000)={0x7fffffff, 0x7, 0x7f}) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:11 executing program 1: r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) socketpair(0x29, 0x1, 0xffff, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5000000000}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44010}, 0x4400) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x6, 0x12) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000000)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000140)={"4c1a588d523ae3fdd531f52b469129f1", r3, 0x0, {0x8, 0x5}, {0x101, 0xfff}, 0x1f, [0xffffffffffffff05, 0xfffffffffffffff7, 0x40, 0x3, 0x6d, 0x400, 0x8, 0x5, 0x2, 0x4, 0xff, 0xfff, 0x73, 0xffffffffffffffc1, 0xdc5, 0x6]}) 04:05:11 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x68000, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x204, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:11 executing program 0: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:11 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/179) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:11 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0xc020660b) 04:05:11 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0xc020660b) 04:05:11 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000240)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000006c0)={"6a075aa9effc69c63a25315e269cc0ae", 0x0, 0x0, {0x5344eacd, 0x8}, {0xffffffff, 0xffff}, 0x1, [0x9d, 0x7, 0x7fffffff, 0x2, 0x7, 0x3f, 0x8, 0x0, 0x0, 0x5, 0x7, 0x0, 0x2, 0x7, 0x6, 0x9]}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000007c0)={"b3c4d888df1660e9540bf532435febde", r2, r3, {0xffffffff, 0x40}, {0x79b1, 0xfffffffa}, 0x6, [0x8, 0xc, 0x6, 0x6, 0x4, 0xfffffffffffffffd, 0x2, 0x4c, 0x6, 0x6, 0x800, 0x40, 0x2, 0x1, 0x6000000000000000, 0x5]}) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) recvmsg(r0, &(0x7f0000000580)={&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)}, {&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/101, 0x65}], 0x3, &(0x7f0000000500)=""/72, 0x48}, 0x102) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xb4, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x89}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x19}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9849}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x32}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3b5}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={'\x00', '\xff\xff', @loopback}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x22}}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x58, r4, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4020) ioctl$MON_IOCQ_URB_LEN(r0, 0x5421) 04:05:11 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x69cc00, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:12 executing program 0: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/179) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "89044b1e10dde3c252dc20e71b9ddb4144b1ed0e92293af992b7cb4be36e664c180f2b745cd1856d445abbe14b8e975d376526cfb990b34a377fb6e325716843ddaebf1b75f95390b0492dfba1ba0d62e9a090959b8b1a0d6ddb440912f0d1e821839ad87d3d859660bef0635a2aa6f2554627f3bb0b89f2503bbbd749a39fd60da40a705d5dd39ffb725224fb5bb4a7a223f0c1accbf1be83ecc759329a3e243b80d960968a8a114ad24c0d851c88a965e94b30aa8c6f7aa91b77b3e9baf03f02a9bba21c910a9e7b3136ecd38459b65c7d4878427ab75b59ee61cde7339fb473c030667424095f8ce82ee0305a19a9ea2a83500d72b0313bba8e38990be1c7ed715e3ff1eb3564ee4def7b111d93b31f00aa2da5db80fd9cd3d368b27e5335f8f176d8577822ab1ed875272872ef772e7650e8483bdb68521c74bd2ca88db58210622d65f73c23384b67fadee3b25f0cd8453b2f402b2e2c787b259ab40cedf7e10dcffaa15aa82b2aedbfdaca926ad3744dc92dae6141cf0590f6907c7e720bad27472f6fcccc7b7f5b9f975e9258851d71285c6918ca3526d126ffa6284b45b02b9827b6644f926c41940fbe83ff1791665d5901be8fa843179d1900441ffae6217a4fcf0e6eab4761a7e85299507f1422914d12698f761d37dbd4290e6f22c1cad1d063f40b077341015b63e0b49186235a38575088f5838a182d8a250a077e1f0883f035ad3f20dfc9f0ad948635335b0d340c23316223c6827bdc6b9c16c3baec91f2fd1f93ed8a2dc07b136255a71e1ad74c50a9878d66e7fa80075e9b0362cc0cb4e0fcbbd166f012ff1ed45a62785b3c67c9faa25a6c9cda4ef93b6458f7551912037e0b4c5f97c375f6509ee4f09ff8359aed60f775d02e4016ab79fee8a99bb21ca69c8ae6db8527d9b5d7317de1d7e3b9044c32638111ffa270064438e622b0fac814622172e00d0812ecd545c72441c4d22bd7755385e1a6a483b16ae39bdf971e4e99a771c8bff2996621d9dd86d8c25fa9671faa4a8828a6f5898480ee21b26502c841333688d0b1921383769cc22178f8cecc749b9a871b346be6bae4c3699b5a41901034b6348bf453aeca95f36bdfc9b6d3c883e1ed9630f0d5789f3eab9f6298109a07d592c8195e3bfc67484e560df5ba71605f308622850d923ee1acdc91b66d9642142af2881e536f3ebde61cb7490afffcf4c60b45b9a1694671ccb84891d67dba6d01183c0f859c319a10a052deb5111516abee4215bd48171ae1b8c6d51e9d431db84521cae631e5761b6ec21047128312dc5cc53a5fe2d91406f24fb32c4164c35fae494c8067274edf26419087bb27ecfafff4f9a440697feaeffc18974f1e174b7918d07b9792fd206723de8f38ee4632fe468e68094c52a53edf0406b609dde0adc466b2e0ea06ebe78bd3ef41da5fd41561beacaa2d0111b4e43963dc321e9a9ead9bc840bca25311df72dfaa1078d52e7116cefd99a46117262a5dbc1a1d316daa5382228a08ce21bc9a74e4c31544b58ae4300c605c5355ca4ff616d44114c10d46df46ea8f69a1601bce9a21681f3270a827d75f746b253c9612fbad907bfc3fa1c6d6766aa22edb0e14515a260a17dcf6fb168f2eb9a48ddc0c758d29790095602f949568c368462cbd191e4a7b53488397f3e5c573d64029015a12a1e737be3e959b4aa30ea84cbb5006905effc30640a2997a2bcceb73a0274b311d3d99e4e4989c75036c4ae672e9c59034c2c5770179164aaea4bcf10ab9145fc8fb0a30c36f40ec0556f170428518b5ab4de7f2fc4dd491e4cf0049ad46d04ee372c1eba686d0ecf1d43c8b5a8de9bdd8c31d50177e641f53c1a1ab87e3a76a03123c504bf354d65c040a7e45d5a84543c427f72ed470433d6ed0eafdcdab6d93c6d7c80d5bcccf81d44b2497c492b05c5d482cf400c40a532ac4e3f12c035056f313851f72bccaca5334db105e96dc9b27aced14196614210905c7eba81b27edee237617f3625fdd85c799484e6dd5bdb09c86a3f36e764144551fb3c3ff2d493d04719bf2d5b1cbe12a1f4b28fe4fd8ad2df160a7db0d165b563a22390a7491773bd38bdcd3348acb1fca28b23d62dd0c7fafa12db0b757bc332005102ce24879e3905e335e8d651d66cd391c3d273c24c14490a64954f3f8a6a59c84eadb1559963472647422710a1090d1696dbd49e366ba90e7ef50d6e1d05522aaab000852dceecbae106140bbe57f3abfd2ee9c0158cab8543fa77c9ae30f84fcde8526f0888da90fbe762f24faa3da3ea80b42a9289674b888cee035b8848873f6b04afb0ae3f535bc675d650a36c29b3c7c26846429531d0c612be27a5f39cc78b40e08d2ff6f37a46fe343c59f3bd06c316ba27808a62453beb33350178f5e22aee97fbee266e9defde0e3a571ed4ee4674c7baead9872514a1cf01ec03247d58fcad5ecceb7361e46b04537654e7494307ea95332cea26c02ee2f59fbd69e3f67dcdda2e0de36c2187ac0025fdd1e2e775e9bc16727521824003b5e8fcf942fdf0e74e3ffd92bf0ec639c4461f5a31448dbd85fd6d60cde9fef5d7eb0b81d9a8bfbe2c74a532d5cf3bd21c8423ee83adfc3cec9de67e1f8be05fdadef394f1f9aeaa6311c39f94145fe6d0a26959db289d20de385db7ea1a2462f6ea7eaaa8d8b7d0395cf1c45a47aa21dc112117130cf74684b216259551028ff10911a6a053f8e62d5af1ca8f368653660bf35e211bb78360001d3df7ae1ddb32dc36de63dfff8436a866373f3d593ff58e7db210f7f0b32acb2e22af43228a4c6979df19f3a5b5f00cd20553d1c9e51cc2e1fc92470b676c201e81e4b404fb50c220e6a9b811fa21f6b2531024a87b5c8a1494374fd17786446d34dad045dd0dfb623dd4c77b4630d5d59fd03e4062b5ba9b8cee3078d3b6543a7b5390647bad6679bff17a6bf16abebb3aa40696b0e27a662f67f78987a92697804e4b4b0f041ce526aca8259a75e2811c66e5edb6ccbe60c77775bbeabebc1c2834d343da412a6aa8078c7e3694156e950a013ad56c040105768d66ee3bd25b60c957b5b7372e4bcbd723921505617d072bb95cb0e7f4b50ec59a241e72d8e045b506f024846e5bc146737ac01c4a9109256aa06d757080215f17fa920d9df3eec42d40b4b83e05ad1d25a7b1516a1e89f91519832da8933d96dc6bfbf8954ea2cb668fe18b106fb987e3279887631388c8d2f83155447f37a9c072398aac68f79f0b57dd8cc58006cf25d7cd55aca30b24a8de70341cd05084598f26210a5d0ab471fd524ec8df08d5daedc7a0a1d7ac6fbe94c7e1f25db2f30954f12487a8e1fac2e98c40afe45a25d5b563b5b70a03b1c5f74b2501fec81e1291e1b0e867a29eb6f9939fc9b7b3b5686d0a2abc5edb36fb0d08106084abfc854a043401862c8f090702b07795dabe363b9352e115213ff539d24b6b0ccf79c3507eb2ebef8c931c09378feb89b708743497303668746a14fdd0d6edb826e9d3a4590869f28b2359cda747f41b390a06e833feff625e366e4f1cc5e95518aa146c2c63778fb3dafba51a8c3f5f43919fb28946fa5fdde941b9f5fd7e6e80d54f76979894a10b36e6ae3b1d9c22e317a944b8e1e0e39834e83b4d6bfa87a10ecfd9028883df424e47332ae9adebea443a0f8f32f30fb0dc8e570a1530b5714fe13259e7bf23bc6064b9f58a12e8f77b04f386e7e6eab906a34e461665442b99f75d4ba812fbe4d3f7a2f536973fc39f8968d2b7868837e0ef19bf4e3b4695e43e4c235e5537a27bab76aa7e9a2076165886a4c2ef3c2a3325b9e98d26a6fdd237cde4b9fa61536c7af43def2081b9779f5dd66143f8467270d2d5f5f0a3013cc46ee3435c6ead47adef4f0b4195cfb3581a487e670efc9c5e3f39ab58f991b670e524064a602ba5ec15864b11b52c4c3c29719dd07ebb6d37ac9d0f414e24ddb5ae2562273014d4e9764e54494fa504501f82d239adc675d74423ab9dcd720b024b5256d5cfa7b5759ce38b619794d6a6713a6ca70dc86757ca50d38ceb82b6a036081481a5db176c7fd22a84ea4d547779c9bcfb47fc8f58961f4a094a82c7fd4e7e2340de79c45e70cb1ba66c134171b4b2e84b1e108db277e70206e7b42d1ebf89ed14913cb9de3168882d342c60d205ecc536019761106368accc4d138f7b49bb3c6bd136fd2ca1fa996180ccd3979b739bc40e132953b6293fddf8afdc19711ecec8f6970d7c04729fada4687999ce89af922795a844b60faf8fed8244fd5c4e4a04839df59360ffb14123b7d7f21448052b7b9020efbe50e157e12effacbaec5d7d6d01c7766f3c7899085699024cde6bda9b9a29d2ca4d3c1c702988b8a917fcc4b4d120338e9c17c6c6c778f3463a51c933f606049262dce08a31b942d2e4a1fc5ae8b41c72569022d07d2279397cf2746f9f2cd1526d508905bf8ccb0f025e5e067ed33d83b3ab6cec523c1ca6205f16e91361ffabecb593476ad32a844d36c78d5c67b0dd6194edf12bfe2cadf28cecc57dbb10e856994dae840da32bfd9bf8e271fc2b05ed8b85c3c81872f231921724d7da3b62c85fdd9d2ac420d3338687b8e21acc58fcb07fa1882934ec28954700d776173b52ade63398a6b5bd2ceed744a3311eff2499c00603eadba21f3d762ec6b3af8cee26584f05ff95d6de42667ee80b151dad81731158be5d732c2055c3ef829a4c552d1b9a351af7f5902aca77e3481911c59ec1dc238192f1277f0bc1412f5f7d29e511588d386e175c74b1e4e9e22b8aed84821cc67dd2b470c520a7c81060a971a7ee47ae32c0ae9ba422893478931fb6b6a02e1a1f9c5de13c0c247c5617613f4168def764777f0d062ebe9e990ee3374e4d381e114454f0e4449fe4b43211a0ee7070a7dc2424b28422c7dcda2af302db838b030b776cd8f8d3e571ca923a5fe6d6188bb556e125826090e9365b068e6ecbe0eeac88d3cb7e94a8369482b35b03a833cea6e8bec94d2683bab5a78fb38fe202a46abc928252e06ea5b394879bf0e6e3857f3486de8b0ebd2be365aa165fa725129d9b0972924089984bc13e5d8b7a12ed723f6c31f516ecc16b971cec02d18403ded971a522525010280e18b1557c542120dde13b2c0299b6e4804f2e7b18d9207f4cb61c77f04215c9a08c7c4565a11c6338cf11ee22327f3e8fad120ab034d0b07faf0a664fccb30732e04bc326c9b6c2b8a45aa5f0dd44bfd4b378f6183057eabaa1c0c63a24b4a33b61b017d88ee150f43906ed4f3d54012688a1d3beed931105a11726e3c1e4be3c98439be14307ce1a89cb370f42c8af5e55e5bcd33844a86b87303c6b83f2d8d237bc11b636c40920c61a830bf10ff771e44848f4c421fb44eb4bb602a43edb9e0e18f12e66004796aa2e7b35526ad0c9820321b4aefc08717618e5bfd68757562e09f3ecd1e94360de900a4b22946494bdfecd2cf24c125e680188f5ee62e896e9bac2367a3ab98bf6507c7705913f2722b2816b704efcc2fd1eb15ac95d66617e6576ba1ec8c6561af882e6d85d2ad74e0def56ce6f69e654ef67b211b5198ae4da3da4e54fc8b61fd9d4de2314dc29087f1daf4a4b49b3e0135677420ca42d0e989a5e9578c5f2072672bb1406e03e18e632349f0cc41564fe2795074db4aa9830901b6d1063cfa14549b0283a77cde34ef3b9fb52a42bfbc5c76b7ba8d0008d974e9bcaacbc17688d6efb0a1cf1bc09860959c448186e11ba6f12f0a5321912d2b8b99ca0461ff76f7e7"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000080), 0x3f, 0x4040) 04:05:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "89044b1e10dde3c252dc20e71b9ddb4144b1ed0e92293af992b7cb4be36e664c180f2b745cd1856d445abbe14b8e975d376526cfb990b34a377fb6e325716843ddaebf1b75f95390b0492dfba1ba0d62e9a090959b8b1a0d6ddb440912f0d1e821839ad87d3d859660bef0635a2aa6f2554627f3bb0b89f2503bbbd749a39fd60da40a705d5dd39ffb725224fb5bb4a7a223f0c1accbf1be83ecc759329a3e243b80d960968a8a114ad24c0d851c88a965e94b30aa8c6f7aa91b77b3e9baf03f02a9bba21c910a9e7b3136ecd38459b65c7d4878427ab75b59ee61cde7339fb473c030667424095f8ce82ee0305a19a9ea2a83500d72b0313bba8e38990be1c7ed715e3ff1eb3564ee4def7b111d93b31f00aa2da5db80fd9cd3d368b27e5335f8f176d8577822ab1ed875272872ef772e7650e8483bdb68521c74bd2ca88db58210622d65f73c23384b67fadee3b25f0cd8453b2f402b2e2c787b259ab40cedf7e10dcffaa15aa82b2aedbfdaca926ad3744dc92dae6141cf0590f6907c7e720bad27472f6fcccc7b7f5b9f975e9258851d71285c6918ca3526d126ffa6284b45b02b9827b6644f926c41940fbe83ff1791665d5901be8fa843179d1900441ffae6217a4fcf0e6eab4761a7e85299507f1422914d12698f761d37dbd4290e6f22c1cad1d063f40b077341015b63e0b49186235a38575088f5838a182d8a250a077e1f0883f035ad3f20dfc9f0ad948635335b0d340c23316223c6827bdc6b9c16c3baec91f2fd1f93ed8a2dc07b136255a71e1ad74c50a9878d66e7fa80075e9b0362cc0cb4e0fcbbd166f012ff1ed45a62785b3c67c9faa25a6c9cda4ef93b6458f7551912037e0b4c5f97c375f6509ee4f09ff8359aed60f775d02e4016ab79fee8a99bb21ca69c8ae6db8527d9b5d7317de1d7e3b9044c32638111ffa270064438e622b0fac814622172e00d0812ecd545c72441c4d22bd7755385e1a6a483b16ae39bdf971e4e99a771c8bff2996621d9dd86d8c25fa9671faa4a8828a6f5898480ee21b26502c841333688d0b1921383769cc22178f8cecc749b9a871b346be6bae4c3699b5a41901034b6348bf453aeca95f36bdfc9b6d3c883e1ed9630f0d5789f3eab9f6298109a07d592c8195e3bfc67484e560df5ba71605f308622850d923ee1acdc91b66d9642142af2881e536f3ebde61cb7490afffcf4c60b45b9a1694671ccb84891d67dba6d01183c0f859c319a10a052deb5111516abee4215bd48171ae1b8c6d51e9d431db84521cae631e5761b6ec21047128312dc5cc53a5fe2d91406f24fb32c4164c35fae494c8067274edf26419087bb27ecfafff4f9a440697feaeffc18974f1e174b7918d07b9792fd206723de8f38ee4632fe468e68094c52a53edf0406b609dde0adc466b2e0ea06ebe78bd3ef41da5fd41561beacaa2d0111b4e43963dc321e9a9ead9bc840bca25311df72dfaa1078d52e7116cefd99a46117262a5dbc1a1d316daa5382228a08ce21bc9a74e4c31544b58ae4300c605c5355ca4ff616d44114c10d46df46ea8f69a1601bce9a21681f3270a827d75f746b253c9612fbad907bfc3fa1c6d6766aa22edb0e14515a260a17dcf6fb168f2eb9a48ddc0c758d29790095602f949568c368462cbd191e4a7b53488397f3e5c573d64029015a12a1e737be3e959b4aa30ea84cbb5006905effc30640a2997a2bcceb73a0274b311d3d99e4e4989c75036c4ae672e9c59034c2c5770179164aaea4bcf10ab9145fc8fb0a30c36f40ec0556f170428518b5ab4de7f2fc4dd491e4cf0049ad46d04ee372c1eba686d0ecf1d43c8b5a8de9bdd8c31d50177e641f53c1a1ab87e3a76a03123c504bf354d65c040a7e45d5a84543c427f72ed470433d6ed0eafdcdab6d93c6d7c80d5bcccf81d44b2497c492b05c5d482cf400c40a532ac4e3f12c035056f313851f72bccaca5334db105e96dc9b27aced14196614210905c7eba81b27edee237617f3625fdd85c799484e6dd5bdb09c86a3f36e764144551fb3c3ff2d493d04719bf2d5b1cbe12a1f4b28fe4fd8ad2df160a7db0d165b563a22390a7491773bd38bdcd3348acb1fca28b23d62dd0c7fafa12db0b757bc332005102ce24879e3905e335e8d651d66cd391c3d273c24c14490a64954f3f8a6a59c84eadb1559963472647422710a1090d1696dbd49e366ba90e7ef50d6e1d05522aaab000852dceecbae106140bbe57f3abfd2ee9c0158cab8543fa77c9ae30f84fcde8526f0888da90fbe762f24faa3da3ea80b42a9289674b888cee035b8848873f6b04afb0ae3f535bc675d650a36c29b3c7c26846429531d0c612be27a5f39cc78b40e08d2ff6f37a46fe343c59f3bd06c316ba27808a62453beb33350178f5e22aee97fbee266e9defde0e3a571ed4ee4674c7baead9872514a1cf01ec03247d58fcad5ecceb7361e46b04537654e7494307ea95332cea26c02ee2f59fbd69e3f67dcdda2e0de36c2187ac0025fdd1e2e775e9bc16727521824003b5e8fcf942fdf0e74e3ffd92bf0ec639c4461f5a31448dbd85fd6d60cde9fef5d7eb0b81d9a8bfbe2c74a532d5cf3bd21c8423ee83adfc3cec9de67e1f8be05fdadef394f1f9aeaa6311c39f94145fe6d0a26959db289d20de385db7ea1a2462f6ea7eaaa8d8b7d0395cf1c45a47aa21dc112117130cf74684b216259551028ff10911a6a053f8e62d5af1ca8f368653660bf35e211bb78360001d3df7ae1ddb32dc36de63dfff8436a866373f3d593ff58e7db210f7f0b32acb2e22af43228a4c6979df19f3a5b5f00cd20553d1c9e51cc2e1fc92470b676c201e81e4b404fb50c220e6a9b811fa21f6b2531024a87b5c8a1494374fd17786446d34dad045dd0dfb623dd4c77b4630d5d59fd03e4062b5ba9b8cee3078d3b6543a7b5390647bad6679bff17a6bf16abebb3aa40696b0e27a662f67f78987a92697804e4b4b0f041ce526aca8259a75e2811c66e5edb6ccbe60c77775bbeabebc1c2834d343da412a6aa8078c7e3694156e950a013ad56c040105768d66ee3bd25b60c957b5b7372e4bcbd723921505617d072bb95cb0e7f4b50ec59a241e72d8e045b506f024846e5bc146737ac01c4a9109256aa06d757080215f17fa920d9df3eec42d40b4b83e05ad1d25a7b1516a1e89f91519832da8933d96dc6bfbf8954ea2cb668fe18b106fb987e3279887631388c8d2f83155447f37a9c072398aac68f79f0b57dd8cc58006cf25d7cd55aca30b24a8de70341cd05084598f26210a5d0ab471fd524ec8df08d5daedc7a0a1d7ac6fbe94c7e1f25db2f30954f12487a8e1fac2e98c40afe45a25d5b563b5b70a03b1c5f74b2501fec81e1291e1b0e867a29eb6f9939fc9b7b3b5686d0a2abc5edb36fb0d08106084abfc854a043401862c8f090702b07795dabe363b9352e115213ff539d24b6b0ccf79c3507eb2ebef8c931c09378feb89b708743497303668746a14fdd0d6edb826e9d3a4590869f28b2359cda747f41b390a06e833feff625e366e4f1cc5e95518aa146c2c63778fb3dafba51a8c3f5f43919fb28946fa5fdde941b9f5fd7e6e80d54f76979894a10b36e6ae3b1d9c22e317a944b8e1e0e39834e83b4d6bfa87a10ecfd9028883df424e47332ae9adebea443a0f8f32f30fb0dc8e570a1530b5714fe13259e7bf23bc6064b9f58a12e8f77b04f386e7e6eab906a34e461665442b99f75d4ba812fbe4d3f7a2f536973fc39f8968d2b7868837e0ef19bf4e3b4695e43e4c235e5537a27bab76aa7e9a2076165886a4c2ef3c2a3325b9e98d26a6fdd237cde4b9fa61536c7af43def2081b9779f5dd66143f8467270d2d5f5f0a3013cc46ee3435c6ead47adef4f0b4195cfb3581a487e670efc9c5e3f39ab58f991b670e524064a602ba5ec15864b11b52c4c3c29719dd07ebb6d37ac9d0f414e24ddb5ae2562273014d4e9764e54494fa504501f82d239adc675d74423ab9dcd720b024b5256d5cfa7b5759ce38b619794d6a6713a6ca70dc86757ca50d38ceb82b6a036081481a5db176c7fd22a84ea4d547779c9bcfb47fc8f58961f4a094a82c7fd4e7e2340de79c45e70cb1ba66c134171b4b2e84b1e108db277e70206e7b42d1ebf89ed14913cb9de3168882d342c60d205ecc536019761106368accc4d138f7b49bb3c6bd136fd2ca1fa996180ccd3979b739bc40e132953b6293fddf8afdc19711ecec8f6970d7c04729fada4687999ce89af922795a844b60faf8fed8244fd5c4e4a04839df59360ffb14123b7d7f21448052b7b9020efbe50e157e12effacbaec5d7d6d01c7766f3c7899085699024cde6bda9b9a29d2ca4d3c1c702988b8a917fcc4b4d120338e9c17c6c6c778f3463a51c933f606049262dce08a31b942d2e4a1fc5ae8b41c72569022d07d2279397cf2746f9f2cd1526d508905bf8ccb0f025e5e067ed33d83b3ab6cec523c1ca6205f16e91361ffabecb593476ad32a844d36c78d5c67b0dd6194edf12bfe2cadf28cecc57dbb10e856994dae840da32bfd9bf8e271fc2b05ed8b85c3c81872f231921724d7da3b62c85fdd9d2ac420d3338687b8e21acc58fcb07fa1882934ec28954700d776173b52ade63398a6b5bd2ceed744a3311eff2499c00603eadba21f3d762ec6b3af8cee26584f05ff95d6de42667ee80b151dad81731158be5d732c2055c3ef829a4c552d1b9a351af7f5902aca77e3481911c59ec1dc238192f1277f0bc1412f5f7d29e511588d386e175c74b1e4e9e22b8aed84821cc67dd2b470c520a7c81060a971a7ee47ae32c0ae9ba422893478931fb6b6a02e1a1f9c5de13c0c247c5617613f4168def764777f0d062ebe9e990ee3374e4d381e114454f0e4449fe4b43211a0ee7070a7dc2424b28422c7dcda2af302db838b030b776cd8f8d3e571ca923a5fe6d6188bb556e125826090e9365b068e6ecbe0eeac88d3cb7e94a8369482b35b03a833cea6e8bec94d2683bab5a78fb38fe202a46abc928252e06ea5b394879bf0e6e3857f3486de8b0ebd2be365aa165fa725129d9b0972924089984bc13e5d8b7a12ed723f6c31f516ecc16b971cec02d18403ded971a522525010280e18b1557c542120dde13b2c0299b6e4804f2e7b18d9207f4cb61c77f04215c9a08c7c4565a11c6338cf11ee22327f3e8fad120ab034d0b07faf0a664fccb30732e04bc326c9b6c2b8a45aa5f0dd44bfd4b378f6183057eabaa1c0c63a24b4a33b61b017d88ee150f43906ed4f3d54012688a1d3beed931105a11726e3c1e4be3c98439be14307ce1a89cb370f42c8af5e55e5bcd33844a86b87303c6b83f2d8d237bc11b636c40920c61a830bf10ff771e44848f4c421fb44eb4bb602a43edb9e0e18f12e66004796aa2e7b35526ad0c9820321b4aefc08717618e5bfd68757562e09f3ecd1e94360de900a4b22946494bdfecd2cf24c125e680188f5ee62e896e9bac2367a3ab98bf6507c7705913f2722b2816b704efcc2fd1eb15ac95d66617e6576ba1ec8c6561af882e6d85d2ad74e0def56ce6f69e654ef67b211b5198ae4da3da4e54fc8b61fd9d4de2314dc29087f1daf4a4b49b3e0135677420ca42d0e989a5e9578c5f2072672bb1406e03e18e632349f0cc41564fe2795074db4aa9830901b6d1063cfa14549b0283a77cde34ef3b9fb52a42bfbc5c76b7ba8d0008d974e9bcaacbc17688d6efb0a1cf1bc09860959c448186e11ba6f12f0a5321912d2b8b99ca0461ff76f7e7"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000080), 0x3f, 0x4040) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) 04:05:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) ptrace$peekuser(0x3, r3, 0xc99b) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f0000000000)=""/179) 04:05:12 executing program 0: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0xcb48, 0x4000) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000080), 0x3f, 0x4040) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) ptrace$peekuser(0x3, 0x0, 0x1) 04:05:12 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4000) 04:05:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 3: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) r3 = getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r4, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) syz_open_procfs$namespace(r3, 0x0) 04:05:12 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) socket$bt_bnep(0x1f, 0x3, 0x4) 04:05:12 executing program 3: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000009680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009640)={&(0x7f00000002c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd702fd54ddbdf250200000008000800040000a2096630e50000000000000000", @ANYRES32=r3, @ANYBLOB="0800080001000000"], 0x34}, 0x1, 0x0, 0x0, 0x48001}, 0x8095) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 04:05:12 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:12 executing program 3: syz_open_dev$dri(0x0, 0xcb48, 0x4000) 04:05:12 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) 04:05:12 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) r8 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYBLOB="3f000000ff078e34adfb527bb0fdd108d9211f3bc9b5703a6ff4a8e1d8fc9b9667806e3cd3fefec00279e9e0022d7284e2061968df0cfd22ff2a2ee3e833c66b517c4b4abdeb4b11120fa51a670ffca536ed2467414d83a148e010aacb8e4eb1e58e91ad89d72935a814931dcaf806b560292b5a5649cf13002584d4ea80980c1d09fb6d363de42050bb7b6fd53bf5e1c495db3cdacd1b98456afafb26ca62abc0"]) 04:05:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) getpgid(r1) recvmsg(r0, &(0x7f00000095c0)={&(0x7f0000009180)=@xdp, 0x80, &(0x7f0000009580)=[{&(0x7f0000009200)=""/206, 0xce}, {&(0x7f0000009300)=""/221, 0xdd}, {&(0x7f0000009400)=""/89, 0x59}, {&(0x7f0000009480)=""/209, 0xd1}], 0x4}, 0x40000000) 04:05:12 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) 04:05:12 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4000) 04:05:12 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) socket$bt_bnep(0x1f, 0x3, 0x4) 04:05:13 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) socket$nl_generic(0x10, 0x3, 0x10) 04:05:13 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) getpgid(r1) 04:05:13 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) 04:05:13 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000180)="5102478590665213ed71476c77ff152eb740bb79f53d0fd404c4bffbfaa0b4492a5db80259fb0747bc41ea3003edfaf248edc03bbef40cc9ad30e4ab2caa863665992f6bde384eb2b4e8c220ce04f5720a6da31e20dce15f4e4d9502a8b60e2ce5a5462812d7eec176b7f6c260c433b87eb9cf979b234e92a9f445d828caf296b18607799cb237b07b0722a7b2becc2913f8cad45f12", 0x96) socket$bt_bnep(0x1f, 0x3, 0x4) 04:05:13 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:13 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) 04:05:13 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:13 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) syz_open_procfs$namespace(r1, 0x0) getpgid(r1) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:13 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:13 executing program 3: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) 04:05:13 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1, 0x0}) getpgid(r1) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(r0, 0xc02864ca, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0], &(0x7f0000000200)=[0x0, r2, 0x0], 0x8001, 0x1, 0x5}) 04:05:13 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = getpgid(0x0) ioctl$DRM_IOCTL_SYNCOBJ_TIMELINE_WAIT(0xffffffffffffffff, 0xc02864ca, &(0x7f00000001c0)={&(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3, 0x1}) getpgid(r0) 04:05:13 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:13 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:13 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) 04:05:13 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = getpgid(0x0) getpgid(r0) 04:05:13 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:13 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:14 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 04:05:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getpgid(0x0) 04:05:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r7, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 04:05:14 executing program 5: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) 04:05:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getpgid(0x0) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 04:05:14 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) 04:05:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getpgid(0x0) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000000)) 04:05:14 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) 04:05:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) prctl$PR_SET_PDEATHSIG(0x1, 0x39) 04:05:14 executing program 4: r0 = getpgid(0x0) getpgid(r0) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000102c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000010280)={&(0x7f000000eec0)={0x13a8, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1318, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x12c, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc921}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0xc4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\+-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '!V@-'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{^-&/{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, ')*d}\xb6(*\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_VALUE={0x11, 0x4, "99c8c217187a47fa2f260a72d0"}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "06452e996f88976990cd25dd49cc5d4db7e62272c5d24a281b71717efb196f0eb9924d127a5380cb0941a685a799cd4dad4e74c1e4940eb1cb925b6b3239964f0ff737391782d6e76bcb30087ce1c9bdcac63cfc8bd490c7f141e6934c977f23430aed6285a0644737d4c2676e7abb1a8c4294a5b423c34fe5b12e4ea6deb61c07b293aef0c25f02e269cf35b79a1638f14b58c1e7f16c4c0ddb76caa5e5be3410235832"}, @ETHTOOL_A_BITSET_MASK={0x61, 0x5, "d61bca2e0c4fc2d9002da079516732f7d6809b665bd70ce0b4886a1b6a4b03b7d938983bf8ef3b5575dd83ec783bfbd48637c215e983b253c41650ef99c66f1cbcacae681a64cbda5e7372e4330529dbaf2123ccadf83ff8c016fb6a24"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x13a8}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) 04:05:14 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can={0x1d, 0x0}, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f000002ad40)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000002ad00)={&(0x7f000002aa80)={0x250, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7f0bc0a55f8dbc}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}]}, @HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 04:05:14 executing program 4: getpgid(0x0) getpgid(0x0) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f000000ee80)={&(0x7f000000ecc0)=@can, 0x80, &(0x7f000000ee00)=[{&(0x7f000000ed40)=""/26, 0x1a}, {&(0x7f000000ed80)=""/91, 0x5b}], 0x2, &(0x7f000000ee40)=""/39, 0x27}, 0x20) 04:05:14 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:14 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) 04:05:14 executing program 1: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:14 executing program 4: getpgid(0x0) getpgid(0x0) 04:05:14 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) recvmsg(r0, &(0x7f000002aa40)={&(0x7f000002a940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000002aa00)=[{&(0x7f000002a9c0)=""/17, 0x11}], 0x1}, 0x40010002) 04:05:14 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) socket$nl_generic(0x10, 0x3, 0x10) 04:05:15 executing program 5: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 4: getpgid(0x0) getpgid(0x0) 04:05:15 executing program 1: socketpair(0xb, 0x4, 0x17, &(0x7f0000000080)) 04:05:15 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) recvmsg(r2, &(0x7f0000022e00)={&(0x7f0000022900)=@xdp, 0x80, &(0x7f0000022cc0)=[{&(0x7f0000022980)=""/42, 0x2a}, {&(0x7f00000229c0)=""/143, 0x8f}, {&(0x7f0000022a80)=""/89, 0x59}, {&(0x7f0000022b00)=""/137, 0x89}, {&(0x7f0000022bc0)=""/194, 0xc2}], 0x5, &(0x7f0000022d40)=""/191, 0xbf}, 0x20) 04:05:15 executing program 5: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x401c5820) 04:05:15 executing program 2: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 1: socketpair(0x0, 0x4, 0x17, &(0x7f0000000080)) 04:05:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) recvmsg(r0, &(0x7f000001a800)={&(0x7f000001a080)=@can, 0x80, &(0x7f000001a740)=[{&(0x7f000001a100)=""/228, 0xe4}, {&(0x7f000001a200)=""/248, 0xf8}, {&(0x7f000001a300)=""/183, 0xb7}, {&(0x7f000001a3c0)=""/155, 0x9b}, {&(0x7f000001a480)=""/221, 0xdd}, {&(0x7f000001a580)=""/18, 0x12}, {&(0x7f000001a5c0)=""/151, 0x97}, {&(0x7f000001a680)}, {&(0x7f000001a6c0)=""/98, 0x62}], 0x9}, 0x41) 04:05:15 executing program 5: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x401c5820) 04:05:15 executing program 2: socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 1: socketpair(0x0, 0x4, 0x17, &(0x7f0000000080)) 04:05:15 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) recvmsg(r1, &(0x7f000000d8c0)={&(0x7f000000d500)=@can, 0x80, &(0x7f000000d780)=[{&(0x7f000000d580)=""/126, 0x7e}, {&(0x7f000000d600)=""/66, 0x42}, {&(0x7f000000d680)=""/53, 0x35}, {&(0x7f000000d6c0)=""/15, 0xf}, {&(0x7f000000d700)=""/40, 0x28}, {&(0x7f000000d740)=""/23, 0x17}], 0x6, &(0x7f000000d800)=""/147, 0x93}, 0x2040) 04:05:15 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 2: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x400454ca) 04:05:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) 04:05:15 executing program 1: socketpair(0x0, 0x4, 0x17, &(0x7f0000000080)) 04:05:15 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:15 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:15 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:15 executing program 2: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 1: socketpair(0xb, 0x0, 0x17, &(0x7f0000000080)) 04:05:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5452) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:15 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:15 executing program 1: socketpair(0xb, 0x0, 0x0, &(0x7f0000000080)) 04:05:15 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:15 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:16 executing program 0: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 2: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 1: socketpair(0xb, 0x0, 0x0, 0x0) 04:05:16 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x6, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}]}, 0xb3) 04:05:16 executing program 1: socketpair(0xb, 0x0, 0x0, 0x0) 04:05:16 executing program 2: socketpair(0x29, 0x0, 0x3, &(0x7f0000000000)) 04:05:16 executing program 0: socketpair(0x29, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 4: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) 04:05:16 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x5, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}]}, 0x9e) 04:05:16 executing program 2: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:16 executing program 1: socketpair(0xb, 0x0, 0x0, 0x0) 04:05:16 executing program 4: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) 04:05:16 executing program 0: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x4, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}]}, 0x89) 04:05:16 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 1: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 2: socketpair(0x29, 0x0, 0x0, 0x0) 04:05:16 executing program 4: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x3, 0x20, [{0x7a}, {0x1d}, {0xa7}]}, 0x74) 04:05:16 executing program 0: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 2: socketpair(0x29, 0x0, 0x0, 0x0) 04:05:16 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:16 executing program 3: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:16 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x2, 0x20, [{0x7a}, {0x1d}]}, 0x5f) 04:05:16 executing program 1: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 0: socketpair(0x0, 0x4, 0x3, &(0x7f0000000000)) 04:05:16 executing program 2: socketpair(0x29, 0x0, 0x0, 0x0) 04:05:16 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:17 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x1, 0x20, [{0x7a}]}, 0x4a) 04:05:17 executing program 3: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x6) 04:05:17 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x5451) 04:05:17 executing program 0: socketpair(0x29, 0x0, 0x3, &(0x7f0000000000)) 04:05:17 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:17 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00'}, 0x35) 04:05:17 executing program 3: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0xab, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:17 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x541b) 04:05:17 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) 04:05:17 executing program 1 (fault-call:0 fault-nth:0): socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:17 executing program 0: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:17 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00'}, 0x35) 04:05:17 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) [ 858.918497][T24580] FAULT_INJECTION: forcing a failure. [ 858.918497][T24580] name failslab, interval 1, probability 0, space 0, times 0 [ 858.964129][T24580] CPU: 0 PID: 24580 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 858.972592][T24580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.982747][T24580] Call Trace: [ 858.986040][T24580] dump_stack+0x202/0x31e [ 858.990396][T24580] ? show_regs_print_info+0x12/0x12 [ 858.995783][T24580] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 859.001608][T24580] ? __fs_reclaim_acquire+0x30/0x30 [ 859.006818][T24580] ? __might_sleep+0x100/0x100 [ 859.011694][T24580] should_fail+0x384/0x4b0 [ 859.016148][T24580] ? __anon_vma_prepare+0x66/0x480 [ 859.021369][T24580] should_failslab+0x5/0x20 [ 859.025900][T24580] kmem_cache_alloc+0x6b/0x340 [ 859.030679][T24580] ? rcu_lock_release+0x5/0x20 [ 859.035475][T24580] __anon_vma_prepare+0x66/0x480 [ 859.040436][T24580] do_huge_pmd_anonymous_page+0xbf7/0xce0 [ 859.046237][T24580] ? count_memcg_event_mm+0x2e4/0x330 [ 859.051732][T24580] ? do_swap_page+0x2040/0x2040 [ 859.054864][T24586] FAULT_INJECTION: forcing a failure. [ 859.054864][T24586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 859.056594][T24580] ? vma_thp_gfp_mask+0x170/0x170 [ 859.056673][T24580] handle_mm_fault+0x207e/0x2620 [ 859.056725][T24580] ? finish_fault+0x670/0x670 [ 859.084719][T24580] ? __init_rwsem+0x160/0x160 [ 859.089401][T24580] ? vmacache_find+0x4ef/0x5d0 [ 859.094245][T24580] ? vmacache_update+0x9f/0xf0 [ 859.099021][T24580] do_user_addr_fault+0x8ce/0x1120 [ 859.104159][T24580] exc_page_fault+0xa1/0x1e0 [ 859.108772][T24580] asm_exc_page_fault+0x1e/0x30 [ 859.113630][T24580] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 859.119419][T24580] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 859.139030][T24580] RSP: 0018:ffffc900024dfdf8 EFLAGS: 00010297 [ 859.145108][T24580] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 859.153217][T24580] RDX: 1ffff9200049bfa8 RSI: 0000000000000000 RDI: 0000000000000000 [ 859.161188][T24580] RBP: ffffc900024dfef0 R08: dffffc0000000000 R09: fffffbfff1c70256 [ 859.169157][T24580] R10: fffffbfff1c70256 R11: 0000000000000000 R12: 0000000020000000 [ 859.177148][T24580] R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000005 [ 859.185135][T24580] __sys_socketpair+0x138/0xde0 [ 859.190009][T24580] ? __ia32_sys_socket+0x80/0x80 [ 859.194959][T24580] ? vtime_user_exit+0x2b2/0x3e0 [ 859.199966][T24580] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 859.205979][T24580] __x64_sys_socketpair+0x97/0xb0 [ 859.211026][T24580] do_syscall_64+0x3f/0xb0 [ 859.215466][T24580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 859.221373][T24580] RIP: 0033:0x4665f9 [ 859.225308][T24580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.244920][T24580] RSP: 002b:00007fa6b80a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 859.253446][T24580] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 04:05:17 executing program 0: socketpair(0x29, 0x0, 0x0, 0x0) [ 859.262040][T24580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000029 [ 859.270038][T24580] RBP: 00007fa6b80a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.278014][T24580] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.285994][T24580] R13: 00007ffd096cd7df R14: 00007fa6b80a0300 R15: 0000000000022000 [ 859.304491][T24586] CPU: 1 PID: 24586 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 859.312951][T24586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.323015][T24586] Call Trace: [ 859.326304][T24586] dump_stack+0x202/0x31e [ 859.330654][T24586] ? show_regs_print_info+0x12/0x12 [ 859.335870][T24586] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 859.341602][T24586] ? __might_fault+0xb8/0x110 [ 859.346295][T24586] ? snprintf+0xc0/0x110 [ 859.350555][T24586] should_fail+0x384/0x4b0 [ 859.354985][T24586] _copy_to_user+0x2d/0x130 [ 859.359602][T24586] simple_read_from_buffer+0xd9/0x160 [ 859.364996][T24586] proc_fail_nth_read+0x195/0x210 [ 859.370039][T24586] ? proc_fault_inject_write+0x370/0x370 [ 859.375691][T24586] ? rw_verify_area+0x1b8/0x370 [ 859.380554][T24586] ? fsnotify_perm+0x2fd/0x4d0 [ 859.385330][T24586] ? proc_fault_inject_write+0x370/0x370 [ 859.391024][T24586] vfs_read+0x294/0xc20 [ 859.395194][T24586] ? rcu_lock_release+0x9/0x20 [ 859.399969][T24586] ? mutex_lock_io_nested+0x60/0x60 [ 859.401528][T24594] FAULT_INJECTION: forcing a failure. [ 859.401528][T24594] name failslab, interval 1, probability 0, space 0, times 0 [ 859.405199][T24586] ? kernel_read+0x70/0x70 [ 859.405233][T24586] ? __fget_files+0x34f/0x380 [ 859.405258][T24586] ? mutex_lock_nested+0x1a/0x20 [ 859.405276][T24586] ? __fdget_pos+0x24e/0x2f0 [ 859.436415][T24586] ? ksys_read+0x72/0x2a0 [ 859.440745][T24586] ksys_read+0x171/0x2a0 [ 859.445331][T24586] ? vfs_write+0xc90/0xc90 [ 859.449743][T24586] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 859.455719][T24586] ? lockdep_hardirqs_on+0x8d/0x130 [ 859.460911][T24586] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 859.466886][T24586] do_syscall_64+0x3f/0xb0 [ 859.471298][T24586] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 859.477190][T24586] RIP: 0033:0x41937c [ 859.481090][T24586] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 859.500798][T24586] RSP: 002b:00007fe488573170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 04:05:17 executing program 2 (fault-call:0 fault-nth:0): socketpair(0xb, 0x0, 0x0, &(0x7f0000000080)) 04:05:17 executing program 1 (fault-call:0 fault-nth:1): socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:17 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) [ 859.509222][T24586] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 859.517189][T24586] RDX: 000000000000000f RSI: 00007fe4885731e0 RDI: 0000000000000003 [ 859.525158][T24586] RBP: 00007fe4885731d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.533227][T24586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.541201][T24586] R13: 00007fffd5ac414f R14: 00007fe488573300 R15: 0000000000022000 [ 859.549383][T24594] CPU: 0 PID: 24594 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 859.557811][T24594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.567964][T24594] Call Trace: [ 859.571247][T24594] dump_stack+0x202/0x31e [ 859.575593][T24594] ? show_regs_print_info+0x12/0x12 [ 859.580961][T24594] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 859.586703][T24594] ? __fs_reclaim_acquire+0x30/0x30 [ 859.591923][T24594] ? __might_sleep+0x100/0x100 [ 859.596707][T24594] ? rcu_read_lock_sched_held+0x87/0x110 [ 859.602357][T24594] should_fail+0x384/0x4b0 [ 859.606790][T24594] ? __anon_vma_prepare+0xaf/0x480 [ 859.611912][T24594] should_failslab+0x5/0x20 [ 859.616430][T24594] kmem_cache_alloc+0x6b/0x340 [ 859.621211][T24594] ? __anon_vma_prepare+0x66/0x480 [ 859.626330][T24594] ? rcu_lock_release+0x5/0x20 [ 859.631108][T24594] __anon_vma_prepare+0xaf/0x480 [ 859.633049][T24596] FAULT_INJECTION: forcing a failure. [ 859.633049][T24596] name failslab, interval 1, probability 0, space 0, times 0 [ 859.636057][T24594] do_huge_pmd_anonymous_page+0xbf7/0xce0 [ 859.636090][T24594] ? count_memcg_event_mm+0x2e4/0x330 [ 859.636109][T24594] ? do_swap_page+0x2040/0x2040 04:05:18 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00'}, 0x35) [ 859.636128][T24594] ? vma_thp_gfp_mask+0x170/0x170 [ 859.636157][T24594] handle_mm_fault+0x207e/0x2620 [ 859.674543][T24594] ? finish_fault+0x670/0x670 [ 859.679238][T24594] ? __init_rwsem+0x160/0x160 [ 859.683918][T24594] ? vmacache_find+0x4ef/0x5d0 [ 859.688673][T24594] ? vmacache_update+0x9f/0xf0 [ 859.693439][T24594] do_user_addr_fault+0x8ce/0x1120 [ 859.698568][T24594] exc_page_fault+0xa1/0x1e0 [ 859.703184][T24594] asm_exc_page_fault+0x1e/0x30 [ 859.708039][T24594] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 859.713768][T24594] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 859.733378][T24594] RSP: 0018:ffffc90002e6fdf8 EFLAGS: 00010297 [ 859.739459][T24594] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 859.747438][T24594] RDX: 1ffff920005cdfa8 RSI: 0000000000000000 RDI: 0000000000000000 [ 859.755408][T24594] RBP: ffffc90002e6fef0 R08: dffffc0000000000 R09: fffffbfff1c70256 [ 859.763403][T24594] R10: fffffbfff1c70256 R11: 0000000000000000 R12: 0000000020000000 [ 859.771360][T24594] R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000005 [ 859.779336][T24594] __sys_socketpair+0x138/0xde0 [ 859.784195][T24594] ? __ia32_sys_socket+0x80/0x80 [ 859.789135][T24594] ? vtime_user_exit+0x2b2/0x3e0 [ 859.794071][T24594] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 859.800042][T24594] __x64_sys_socketpair+0x97/0xb0 [ 859.805063][T24594] do_syscall_64+0x3f/0xb0 [ 859.809486][T24594] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 859.815383][T24594] RIP: 0033:0x4665f9 [ 859.819265][T24594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.838867][T24594] RSP: 002b:00007fa6b80a0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 859.847283][T24594] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 859.855252][T24594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000029 04:05:18 executing program 0: socketpair(0x29, 0x0, 0x0, 0x0) [ 859.863210][T24594] RBP: 00007fa6b80a01d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.871172][T24594] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.879132][T24594] R13: 00007ffd096cd7df R14: 00007fa6b80a0300 R15: 0000000000022000 [ 859.909681][T24596] CPU: 1 PID: 24596 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 859.918143][T24596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 859.928190][T24596] Call Trace: [ 859.931458][T24596] dump_stack+0x202/0x31e [ 859.935782][T24596] ? show_regs_print_info+0x12/0x12 [ 859.940972][T24596] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 859.946676][T24596] ? __fs_reclaim_acquire+0x30/0x30 [ 859.951858][T24596] ? __might_sleep+0x100/0x100 [ 859.956613][T24596] should_fail+0x384/0x4b0 [ 859.961015][T24596] ? __anon_vma_prepare+0x66/0x480 [ 859.966112][T24596] should_failslab+0x5/0x20 [ 859.970599][T24596] kmem_cache_alloc+0x6b/0x340 [ 859.975345][T24596] ? rcu_lock_release+0x5/0x20 [ 859.980097][T24596] __anon_vma_prepare+0x66/0x480 [ 859.985024][T24596] do_huge_pmd_anonymous_page+0xbf7/0xce0 [ 859.990731][T24596] ? count_memcg_event_mm+0x2e4/0x330 [ 859.996100][T24596] ? do_swap_page+0x2040/0x2040 [ 860.000937][T24596] ? vma_thp_gfp_mask+0x170/0x170 [ 860.006001][T24596] handle_mm_fault+0x207e/0x2620 [ 860.010939][T24596] ? finish_fault+0x670/0x670 [ 860.015608][T24596] ? __init_rwsem+0x160/0x160 [ 860.020268][T24596] ? vmacache_find+0x4e3/0x5d0 [ 860.025027][T24596] ? vmacache_update+0x9f/0xf0 [ 860.029777][T24596] do_user_addr_fault+0x8ce/0x1120 [ 860.034882][T24596] exc_page_fault+0xa1/0x1e0 [ 860.039467][T24596] asm_exc_page_fault+0x1e/0x30 [ 860.044384][T24596] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 860.050088][T24596] Code: 00 00 48 39 d9 73 54 0f 1f 00 66 89 01 31 c9 0f 1f 00 c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 1f 00 <89> 01 31 c9 0f 1f 00 c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 860.069719][T24596] RSP: 0018:ffffc90002dcfdf8 EFLAGS: 00010293 [ 860.075782][T24596] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000080 [ 860.083753][T24596] RDX: 1ffff920005b9fa8 RSI: 0000000000000000 RDI: 0000000000000000 [ 860.091890][T24596] RBP: ffffc90002dcfef0 R08: dffffc0000000000 R09: fffffbfff1c70256 [ 860.099855][T24596] R10: fffffbfff1c70256 R11: 0000000000000000 R12: 0000000020000080 [ 860.107823][T24596] R13: 0000000000000000 R14: dffffc0000000000 R15: 0000000000000005 [ 860.115795][T24596] __sys_socketpair+0x138/0xde0 [ 860.120644][T24596] ? __ia32_sys_socket+0x80/0x80 [ 860.125590][T24596] ? vtime_user_exit+0x2b2/0x3e0 [ 860.130518][T24596] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 860.136488][T24596] __x64_sys_socketpair+0x97/0xb0 [ 860.141498][T24596] do_syscall_64+0x3f/0xb0 [ 860.145902][T24596] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 860.151781][T24596] RIP: 0033:0x4665f9 [ 860.155674][T24596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.175540][T24596] RSP: 002b:00007feef770a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 860.184121][T24596] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 860.192093][T24596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000b [ 860.200045][T24596] RBP: 00007feef770a1d0 R08: 0000000000000000 R09: 0000000000000000 04:05:18 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) [ 860.208034][T24596] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 860.215992][T24596] R13: 00007ffeb9dabd4f R14: 00007feef770a300 R15: 0000000000022000 04:05:18 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:18 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'!*d}\xb6(*\\\x00'}, 0x35) 04:05:18 executing program 0: socketpair(0x29, 0x0, 0x0, 0x0) 04:05:18 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:18 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:18 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) [ 860.470272][T24614] FAULT_INJECTION: forcing a failure. [ 860.470272][T24614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 860.512519][T24614] CPU: 0 PID: 24614 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 860.520979][T24614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.531068][T24614] Call Trace: [ 860.534366][T24614] dump_stack+0x202/0x31e [ 860.538722][T24614] ? show_regs_print_info+0x12/0x12 [ 860.543939][T24614] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 860.549670][T24614] ? __might_fault+0xb8/0x110 [ 860.554372][T24614] ? snprintf+0xc0/0x110 [ 860.558635][T24614] should_fail+0x384/0x4b0 [ 860.563066][T24614] _copy_to_user+0x2d/0x130 [ 860.567577][T24614] simple_read_from_buffer+0xd9/0x160 [ 860.573020][T24614] proc_fail_nth_read+0x195/0x210 [ 860.578080][T24614] ? proc_fault_inject_write+0x370/0x370 [ 860.583737][T24614] ? rw_verify_area+0x1b8/0x370 [ 860.588604][T24614] ? fsnotify_perm+0x2fd/0x4d0 [ 860.593382][T24614] ? proc_fault_inject_write+0x370/0x370 [ 860.599028][T24614] vfs_read+0x294/0xc20 [ 860.603324][T24614] ? rcu_lock_release+0x9/0x20 [ 860.608103][T24614] ? mutex_lock_io_nested+0x60/0x60 [ 860.613327][T24614] ? kernel_read+0x70/0x70 [ 860.617779][T24614] ? __fget_files+0x34f/0x380 [ 860.622473][T24614] ? mutex_lock_nested+0x1a/0x20 [ 860.627416][T24614] ? __fdget_pos+0x24e/0x2f0 [ 860.632014][T24614] ? ksys_read+0x72/0x2a0 [ 860.636359][T24614] ksys_read+0x171/0x2a0 [ 860.640616][T24614] ? vfs_write+0xc90/0xc90 [ 860.645041][T24614] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 860.651130][T24614] ? lockdep_hardirqs_on+0x8d/0x130 [ 860.656345][T24614] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 860.662337][T24614] do_syscall_64+0x3f/0xb0 [ 860.666759][T24614] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 860.672838][T24614] RIP: 0033:0x41937c [ 860.676829][T24614] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 860.696558][T24614] RSP: 002b:00007fe15b2c3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 860.705072][T24614] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c 04:05:19 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f0000000080)) 04:05:19 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x7, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}, {0xd}]}, 0xc8) 04:05:19 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\'*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 1: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:19 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) [ 860.713054][T24614] RDX: 000000000000000f RSI: 00007fe15b2c31e0 RDI: 0000000000000004 [ 860.721127][T24614] RBP: 00007fe15b2c31d0 R08: 0000000000000000 R09: 0000000000000000 [ 860.729174][T24614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 860.737270][T24614] R13: 00007ffeabc4ce2f R14: 00007fe15b2c3300 R15: 0000000000022000 04:05:19 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'-*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f0000000000)) 04:05:19 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:19 executing program 2: socketpair(0x2, 0x0, 0x0, &(0x7f0000000080)) 04:05:19 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x6, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}, {0x25}]}, 0xb3) 04:05:19 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x5, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}, {0x84}]}, 0x9e) 04:05:19 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'/*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x7) 04:05:19 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000000)) 04:05:19 executing program 2: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000080)) 04:05:19 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\\*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x4, 0x20, [{0x7a}, {0x1d}, {0xa7}, {0x8e}]}, 0x89) 04:05:19 executing program 0: write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x700) 04:05:19 executing program 2: socketpair(0xb, 0x2, 0x0, &(0x7f0000000080)) 04:05:19 executing program 1: socketpair(0x29, 0x2, 0x0, &(0x7f0000000000)) 04:05:19 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')!d}\xb6(*\\\x00'}, 0x35) 04:05:19 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x3, 0x20, [{0x7a}, {0x1d}, {0xa7}]}, 0x74) 04:05:19 executing program 0: write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 2: socketpair(0xb, 0x3, 0x0, &(0x7f0000000080)) 04:05:20 executing program 1: socketpair(0x29, 0x3, 0x0, &(0x7f0000000000)) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x2000) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')\"d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x2, 0x20, [{0x7a}, {0x1d}]}, 0x5f) 04:05:20 executing program 0: write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 2: socketpair(0xb, 0x4, 0x0, &(0x7f0000000080)) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')\'d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 1: socketpair(0x29, 0x4, 0x0, &(0x7f0000000000)) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x200000) 04:05:20 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00', 0x20, 0x0, 0x20, 0x1, 0x20, [{0x7a}]}, 0x4a) 04:05:20 executing program 2: socketpair(0xb, 0x7, 0x0, &(0x7f0000000080)) 04:05:20 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')/d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f) 04:05:20 executing program 1: socketpair(0x29, 0x5, 0x0, &(0x7f0000000000)) 04:05:20 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 2: socketpair(0xb, 0x8, 0x0, &(0x7f0000000080)) 04:05:20 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')\\d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x7000000) 04:05:20 executing program 2: socketpair(0xb, 0xa, 0x0, &(0x7f0000000080)) 04:05:20 executing program 1: socketpair(0x29, 0xa, 0x0, &(0x7f0000000000)) 04:05:20 executing program 3: socketpair(0x29, 0x5, 0x0, &(0x7f0000000000)) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*!}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x7ffff000) 04:05:20 executing program 2: socketpair(0xb, 0xf, 0x0, &(0x7f0000000080)) 04:05:20 executing program 1: socketpair(0x29, 0xf, 0x0, &(0x7f0000000000)) 04:05:20 executing program 3: socketpair(0x29, 0x5, 0x0, &(0x7f0000000000)) 04:05:20 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\"}\xb6(*\\\x00'}, 0x35) 04:05:20 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x200000000000) 04:05:20 executing program 1: socketpair(0x29, 0x10, 0x0, &(0x7f0000000000)) 04:05:20 executing program 2: socketpair(0xb, 0x10, 0x0, &(0x7f0000000080)) 04:05:21 executing program 3: socketpair(0x29, 0x5, 0x0, &(0x7f0000000000)) 04:05:21 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*%}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 1: socketpair(0x29, 0x41, 0x0, &(0x7f0000000000)) 04:05:21 executing program 2: socketpair(0xb, 0x41, 0x0, &(0x7f0000000080)) 04:05:21 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x7ffffffff000) 04:05:21 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, &(0x7f0000000140)={'\"*d}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 3: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 04:05:21 executing program 1: socketpair(0x29, 0x300, 0x0, &(0x7f0000000000)) 04:05:21 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\'}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 2: socketpair(0xb, 0x300, 0x0, &(0x7f0000000080)) 04:05:21 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:21 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:21 executing program 3: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 04:05:21 executing program 1: socketpair(0x29, 0x500, 0x0, &(0x7f0000000000)) 04:05:21 executing program 2: socketpair(0xb, 0x700, 0x0, &(0x7f0000000080)) 04:05:21 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')**}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ffffff7f0000) 04:05:21 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:21 executing program 2: socketpair(0xb, 0xa00, 0x0, &(0x7f0000000080)) 04:05:21 executing program 1: socketpair(0x29, 0xa00, 0x0, &(0x7f0000000000)) 04:05:21 executing program 3: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 04:05:21 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x700000000000000) 04:05:21 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:21 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*/}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 1: socketpair(0x29, 0xf00, 0x0, &(0x7f0000000000)) 04:05:21 executing program 2: socketpair(0xb, 0xf00, 0x0, &(0x7f0000000080)) 04:05:21 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xffffffffffffffff) 04:05:21 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:21 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*L}\xb6(*\\\x00'}, 0x35) 04:05:21 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:21 executing program 1: socketpair(0x29, 0x2000, 0x0, &(0x7f0000000000)) 04:05:21 executing program 2: socketpair(0xb, 0x2000, 0x0, &(0x7f0000000080)) 04:05:22 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000100)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) socketpair(0x15, 0x4, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:05:22 executing program 1: socketpair(0x29, 0x4000, 0x0, &(0x7f0000000000)) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*X}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 2: socketpair(0xb, 0x4000, 0x0, &(0x7f0000000080)) 04:05:22 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:22 executing program 1: socketpair(0x29, 0x4100, 0x0, &(0x7f0000000000)) 04:05:22 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0xe29d, 0x20, 0x3, 0x9}, {0x5, 0x1, 0x6, 0x5}, {0x2, 0xf9, 0x2, 0x7f}, {0x3, 0x5, 0x1f}, {0x101, 0x4, 0x81, 0x3}, {0x865, 0xff, 0x6c, 0x3828}, {0x6, 0x80, 0x6, 0x5}, {0x20, 0x1, 0x0, 0x5eb}]}) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @link_local}]}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], 0x2}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000080)={0x0, 0x1, r3, 0x7ff}) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*[}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:22 executing program 2: socketpair(0xb, 0x4100, 0x0, &(0x7f0000000080)) 04:05:22 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 1: socketpair(0x29, 0x18100, 0x0, &(0x7f0000000000)) 04:05:22 executing program 4: ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)) r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000000)={&(0x7f0000000100)="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", 0x1000}) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:22 executing program 2: socketpair(0xb, 0x18100, 0x0, &(0x7f0000000080)) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\\}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 3: socketpair(0x29, 0x5, 0x0, 0x0) 04:05:22 executing program 0: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 1: socketpair(0x29, 0x20000, 0x0, &(0x7f0000000000)) 04:05:22 executing program 0: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 2: socketpair(0xb, 0x20000, 0x0, &(0x7f0000000080)) 04:05:22 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:22 executing program 3: socketpair(0x29, 0x5, 0x0, 0x0) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*c}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 2: socketpair(0xb, 0x200000, 0x0, &(0x7f0000000080)) 04:05:22 executing program 1: socketpair(0x29, 0x200000, 0x0, &(0x7f0000000000)) 04:05:22 executing program 0: write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x14002, 0x0) write$smackfs_cipso(r0, 0x0, 0x4) 04:05:22 executing program 3: socketpair(0x29, 0x5, 0x0, 0x0) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*h}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 1: socketpair(0x29, 0x810100, 0x0, &(0x7f0000000000)) 04:05:22 executing program 2: socketpair(0xb, 0x810100, 0x0, &(0x7f0000000080)) 04:05:22 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001200), 0x100000, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000013c0)={&(0x7f0000001240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)={0xd0, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x52f1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@private=0xa010101}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xeba7}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x8051}, 0x20000000) r1 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r1, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuacct.usage\x00', 0x2, 0x0) 04:05:22 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*c}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:22 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*i}\xb6(*\\\x00'}, 0x35) 04:05:22 executing program 2: socketpair(0xb, 0x3000000, 0x0, &(0x7f0000000080)) 04:05:22 executing program 1: socketpair(0x29, 0x2000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*[}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xf0ff7f00000000) 04:05:23 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r0, 0xc018480b, 0x0) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) write$smackfs_cipso(r1, 0x0, 0xfffffffffffffee4) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000000)={0x19}) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x20014) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*l}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 1: socketpair(0x29, 0x3000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 2: socketpair(0xb, 0x4000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:23 executing program 4: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 04:05:23 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*X}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 1: socketpair(0x29, 0x4000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 2: socketpair(0xb, 0x7000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*n}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x8, 0x482100) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000040)={0x0, 0x2}) write$smackfs_cipso(r0, 0x0, 0x0) 04:05:23 executing program 1: socketpair(0x29, 0x5000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*l}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:23 executing program 2: socketpair(0xb, 0x8000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*o}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 0: openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0xf0ff7f00000000) 04:05:23 executing program 1: socketpair(0x29, 0xa000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$smackfs_cipso(0xffffffffffffffff, 0x0, 0x0) 04:05:23 executing program 2: socketpair(0xb, 0xa000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 3: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*s}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 0: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*L}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 2: socketpair(0xb, 0xf000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) 04:05:23 executing program 1: socketpair(0x29, 0xf000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\"}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*u}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 2: socketpair(0xb, 0x10000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 0: socketpair(0x29, 0xf, 0x0, &(0x7f0000000000)) 04:05:23 executing program 4: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso2\x00', 0x2, 0x0) write$smackfs_cipso(r0, 0x0, 0xfffffccf) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)) 04:05:23 executing program 1: socketpair(0x29, 0x10000000, 0x0, &(0x7f0000000000)) 04:05:23 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\"}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*x}\xb6(*\\\x00'}, 0x35) 04:05:23 executing program 2: socketpair(0xb, 0x20000000, 0x0, &(0x7f0000000080)) 04:05:23 executing program 0: socketpair(0x29, 0xf, 0x0, &(0x7f0000000000)) 04:05:24 executing program 2: socketpair(0xb, 0x40000000, 0x0, &(0x7f0000000080)) [ 865.453323][T25000] ------------[ cut here ]------------ [ 865.486958][T25000] WARNING: CPU: 1 PID: 25000 at mm/page_alloc.c:5175 __alloc_pages+0x58b/0x5f0 04:05:24 executing program 3: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*\"}\xb6(*\\\x00'}, 0x35) 04:05:24 executing program 5: r0 = openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) write$smackfs_cipso(r0, &(0x7f0000000140)={')*z}\xb6(*\\\x00'}, 0x35) 04:05:24 executing program 1: socketpair(0x29, 0x20000000, 0x0, &(0x7f0000000000)) [ 865.540012][T25000] Modules linked in: [ 865.559244][T25000] CPU: 1 PID: 25000 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 865.592495][T25000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 865.612046][T25000] RIP: 0010:__alloc_pages+0x58b/0x5f0 04:05:24 executing program 0: socketpair(0x29, 0xf, 0x0, &(0x7f0000000000)) 04:05:24 executing program 2: socketpair(0xb, 0x41000000, 0x0, &(0x7f0000000080)) [ 865.637939][T25000] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 5e fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 6d fd ff ff e8 8a e8 09 00 e9 63 fd ff ff <0f> 0b 45 31 e4 e9 7a fd ff ff 48 8d 4c 24 50 80 e1 07 80 c1 03 38 [ 865.745469][T25000] RSP: 0018:ffffc9000a077900 EFLAGS: 00010246 [ 865.768900][T25000] RAX: dffffc0000000000 RBX: 0000000000000013 RCX: 0000000000000000 [ 865.785419][T25000] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc9000a077988 [ 865.793661][T25000] RBP: ffffc9000a077a18 R08: dffffc0000000000 R09: ffffc9000a077960 [ 865.805492][T25000] R10: fffff5200140ef31 R11: 0000000000000000 R12: 0000000000040cc0 [ 865.813499][T25000] R13: ffffc9000a077960 R14: 1ffff9200140ef28 R15: 1ffff9200140ef24 [ 865.821952][T25000] FS: 00007fe15b2c3700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 865.832100][T25000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 865.838944][T25000] CR2: 000000000192f848 CR3: 0000000056f51000 CR4: 00000000001506f0 [ 865.847651][T25000] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 865.856080][T25000] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 865.864150][T25000] Call Trace: [ 865.867783][T25000] ? __rmqueue_pcplist+0x2b30/0x2b30 [ 865.873202][T25000] ? alloc_pages+0x2e5/0x520 [ 865.878079][T25000] kmalloc_order+0x41/0x170 [ 865.882741][T25000] ? __lock_acquire+0x6040/0x6040 [ 865.889274][T25000] kmalloc_order_trace+0x15/0x70 [ 865.894391][T25000] __kmalloc_track_caller+0x28f/0x390 [ 865.900189][T25000] ? cap_capable+0x27e/0x2d0 [ 865.904905][T25000] memdup_user_nul+0x26/0xf0 [ 865.909751][T25000] smk_set_cipso+0x18b/0x7e0 [ 865.914439][T25000] ? read_lock_is_recursive+0x10/0x10 [ 865.921158][T25000] ? smk_open_cipso+0x20/0x20 [ 865.926766][T25000] ? rcu_read_lock_any_held+0xb1/0x130 [ 865.932596][T25000] ? rcu_read_lock_bh_held+0xf0/0xf0 [ 865.938749][T25000] ? __mutex_lock_common+0x550/0x2e50 [ 865.944231][T25000] ? smk_write_access2+0x290/0x290 [ 865.949815][T25000] vfs_write+0x289/0xc90 [ 865.954178][T25000] ? file_end_write+0x220/0x220 [ 865.959524][T25000] ? __fget_files+0x34f/0x380 [ 865.964409][T25000] ? mutex_lock_nested+0x1a/0x20 [ 865.970289][T25000] ? __fdget_pos+0x24e/0x2f0 [ 865.975202][T25000] ? ksys_write+0x72/0x2a0 [ 865.979817][T25000] ksys_write+0x171/0x2a0 [ 865.984226][T25000] ? __ia32_sys_read+0x80/0x80 [ 865.989175][T25000] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 865.995427][T25000] ? lockdep_hardirqs_on+0x8d/0x130 [ 866.000857][T25000] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 866.007086][T25000] do_syscall_64+0x3f/0xb0 [ 866.011598][T25000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 866.018907][T25000] RIP: 0033:0x4665f9 [ 866.022907][T25000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.044373][T25000] RSP: 002b:00007fe15b2c3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 866.053329][T25000] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 866.061569][T25000] RDX: 00000000fffffccf RSI: 0000000000000000 RDI: 0000000000000003 [ 866.069856][T25000] RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000 [ 866.078144][T25000] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 866.086597][T25000] R13: 00007ffeabc4ce2f R14: 00007fe15b2c3300 R15: 0000000000022000 [ 866.094690][T25000] Kernel panic - not syncing: panic_on_warn set ... [ 866.101265][T25000] CPU: 0 PID: 25000 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0 [ 866.109780][T25000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 866.119834][T25000] Call Trace: [ 866.123135][T25000] dump_stack+0x202/0x31e [ 866.127466][T25000] ? show_regs_print_info+0x12/0x12 [ 866.132762][T25000] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 866.138511][T25000] panic+0x2e1/0x850 [ 866.142487][T25000] ? __kernel_text_address+0x93/0x100 [ 866.147989][T25000] ? __warn+0x13e/0x270 [ 866.152148][T25000] ? nmi_panic+0x90/0x90 [ 866.156410][T25000] __warn+0x26a/0x270 [ 866.160416][T25000] ? __alloc_pages+0x58b/0x5f0 [ 866.165174][T25000] ? __alloc_pages+0x58b/0x5f0 [ 866.169938][T25000] report_bug+0x1b1/0x2e0 [ 866.174268][T25000] handle_bug+0x3d/0x70 [ 866.178422][T25000] exc_invalid_op+0x16/0x40 [ 866.182930][T25000] asm_exc_invalid_op+0x12/0x20 [ 866.187764][T25000] RIP: 0010:__alloc_pages+0x58b/0x5f0 [ 866.193251][T25000] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 5e fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 6d fd ff ff e8 8a e8 09 00 e9 63 fd ff ff <0f> 0b 45 31 e4 e9 7a fd ff ff 48 8d 4c 24 50 80 e1 07 80 c1 03 38 [ 866.212950][T25000] RSP: 0018:ffffc9000a077900 EFLAGS: 00010246 [ 866.219005][T25000] RAX: dffffc0000000000 RBX: 0000000000000013 RCX: 0000000000000000 [ 866.227069][T25000] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc9000a077988 [ 866.235046][T25000] RBP: ffffc9000a077a18 R08: dffffc0000000000 R09: ffffc9000a077960 [ 866.243015][T25000] R10: fffff5200140ef31 R11: 0000000000000000 R12: 0000000000040cc0 [ 866.250992][T25000] R13: ffffc9000a077960 R14: 1ffff9200140ef28 R15: 1ffff9200140ef24 [ 866.258983][T25000] ? __rmqueue_pcplist+0x2b30/0x2b30 [ 866.264408][T25000] ? alloc_pages+0x2e5/0x520 [ 866.268990][T25000] kmalloc_order+0x41/0x170 [ 866.273479][T25000] ? __lock_acquire+0x6040/0x6040 [ 866.278498][T25000] kmalloc_order_trace+0x15/0x70 [ 866.283524][T25000] __kmalloc_track_caller+0x28f/0x390 [ 866.288885][T25000] ? cap_capable+0x27e/0x2d0 [ 866.293560][T25000] memdup_user_nul+0x26/0xf0 [ 866.298149][T25000] smk_set_cipso+0x18b/0x7e0 [ 866.302759][T25000] ? read_lock_is_recursive+0x10/0x10 [ 866.308134][T25000] ? smk_open_cipso+0x20/0x20 [ 866.312972][T25000] ? rcu_read_lock_any_held+0xb1/0x130 [ 866.318446][T25000] ? rcu_read_lock_bh_held+0xf0/0xf0 [ 866.323730][T25000] ? __mutex_lock_common+0x550/0x2e50 [ 866.329093][T25000] ? smk_write_access2+0x290/0x290 [ 866.334188][T25000] vfs_write+0x289/0xc90 [ 866.338435][T25000] ? file_end_write+0x220/0x220 [ 866.343291][T25000] ? __fget_files+0x34f/0x380 [ 866.347962][T25000] ? mutex_lock_nested+0x1a/0x20 [ 866.352914][T25000] ? __fdget_pos+0x24e/0x2f0 [ 866.357587][T25000] ? ksys_write+0x72/0x2a0 [ 866.362021][T25000] ksys_write+0x171/0x2a0 [ 866.366542][T25000] ? __ia32_sys_read+0x80/0x80 [ 866.371353][T25000] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 866.377329][T25000] ? lockdep_hardirqs_on+0x8d/0x130 [ 866.382551][T25000] ? syscall_enter_from_user_mode+0x2e/0x1c0 [ 866.388523][T25000] do_syscall_64+0x3f/0xb0 [ 866.392943][T25000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 866.398832][T25000] RIP: 0033:0x4665f9 [ 866.402780][T25000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.422492][T25000] RSP: 002b:00007fe15b2c3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 866.430989][T25000] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 866.439079][T25000] RDX: 00000000fffffccf RSI: 0000000000000000 RDI: 0000000000000003 [ 866.447147][T25000] RBP: 00000000004bfce1 R08: 0000000000000000 R09: 0000000000000000 [ 866.455300][T25000] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 866.463404][T25000] R13: 00007ffeabc4ce2f R14: 00007fe15b2c3300 R15: 0000000000022000 [ 866.472414][T25000] Kernel Offset: disabled [ 866.476859][T25000] Rebooting in 86400 seconds..